Results 301 to 310 of about 10,475,631 (365)
Some of the next articles are maybe not open access.
Learning to hash: forgiving hash functions and applications
Data Mining and Knowledge Discovery, 2008The problem of efficiently finding similar items in a large corpus of high-dimensional data points arises in many real-world tasks, such as music, image, and video retrieval. Beyond the scaling difficulties that arise with lookups in large data sets, the complexity in these domains is exacerbated by an imprecise definition of similarity. In this paper,
Shumeet Baluja, Michele Covell
openaire +2 more sources
Poseidon2: A Faster Version of the Poseidon Hash Function
IACR Cryptology ePrint Archive, 2023Lorenzo Grassi+2 more
semanticscholar +1 more source
2019
The main topic of this book is implementing hash tables; it’s only secondarily about hash functions. This is why you have assumed a priori that you have uniformly distributed hash keys. In reality, this is unlikely to be the case; real data are rarely random samples from the space of possible data values.
openaire +2 more sources
The main topic of this book is implementing hash tables; it’s only secondarily about hash functions. This is why you have assumed a priori that you have uniformly distributed hash keys. In reality, this is unlikely to be the case; real data are rarely random samples from the space of possible data values.
openaire +2 more sources
1996
We give a new definition of keyed hash functions and show its relation with strongly universal hash functions and Cartesian authentication codes. We propose an algorithm for a secure keyed hash function and present preliminary result on its performance. The algorithm can be used for fast (about twice the speed of MD5) and secure message authentication.
Shahram Bakhtiari+2 more
openaire +2 more sources
We give a new definition of keyed hash functions and show its relation with strongly universal hash functions and Cartesian authentication codes. We propose an algorithm for a secure keyed hash function and present preliminary result on its performance. The algorithm can be used for fast (about twice the speed of MD5) and secure message authentication.
Shahram Bakhtiari+2 more
openaire +2 more sources
IEEE Transactions on Computers, 2005
Bank conflicts can severely reduce the bandwidth of an interleaved multibank memory and conflict misses increase the miss rate of a cache or a predictor. Both occurrences are manifestations of the same problem: objects, which should be mapped to different indices, are accidentally mapped to the same index.
Vandierendonck, Hans, De Bosschere, K.
openaire +2 more sources
Bank conflicts can severely reduce the bandwidth of an interleaved multibank memory and conflict misses increase the miss rate of a cache or a predictor. Both occurrences are manifestations of the same problem: objects, which should be mapped to different indices, are accidentally mapped to the same index.
Vandierendonck, Hans, De Bosschere, K.
openaire +2 more sources
Brute force attacks on hash functions
Journal of Discrete Mathematical Sciences and Cryptography, 2007We examine preimage, second preimage and collision resistance of cryptoghraphic hash functions for a particular class of brute force attacks.
LACCETTI, GIULIANO, G. Schmid
openaire +5 more sources
Modern Cryptography with Proof Techniques and Applications, 2021
S. Hwang, Intae Kim, W. Lee
semanticscholar +1 more source
S. Hwang, Intae Kim, W. Lee
semanticscholar +1 more source
Hash functions and Cayley graphs
Designs, Codes and Cryptography, 1994zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +3 more sources
Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic
Nonlinear dynamics, 2020J. Teh, Moatsum Alawida, Jia Jie Ho
semanticscholar +1 more source
European Transactions on Telecommunications, 1994
AbstractHash functions were introduced in cryptology in the late seventies as a tool to protect the authenticity of information. Soon it became clear that they were a very useful building block to solve other security problems in telecommunication and computer networks.
openaire +2 more sources
AbstractHash functions were introduced in cryptology in the late seventies as a tool to protect the authenticity of information. Soon it became clear that they were a very useful building block to solve other security problems in telecommunication and computer networks.
openaire +2 more sources