Results 31 to 40 of about 10,475,631 (365)
In this paper an efficient open address hash function called exponential hashing is developed. The motivation for this hash function resulted from our ongoing efforts to apply dynamical systems theory to the study of hashing; however, the analysis conducted in this paper is primarily based on traditional number theory. Proofs of optimal table parameter
Chaouki T. Abdallah+2 more
openaire +2 more sources
Electron contact interlayers for low‐temperature‐processed crystalline silicon solar cells
In this study, a series of interlayers are trialed as electron‐selective contacts on crystalline silicon, including several materials that were previously untested in this application. Most of these interlayers were found to achieve mΩcm2‐scale specific contact resistivities.
Jesus Ibarra Michel+11 more
wiley +1 more source
Analysis of the amplitude form of the quantum hash function
In this article, the properties of quantum hash functions are further explored. Previous findings show that so-called small-bias sets (special subsets of the set of elements of a cyclic group) generate a “phase” quantum hash function. Here, it was proved
M. F. Ablayev+2 more
doaj +1 more source
Theoretical and Experimental Analysis of Cryptographic Hash Functions
The paper presents a theoretical introduction to the cryptographic hash function theory and a statistical experimental analysis of selected hash functions.
Jacek Tchórzewsk+1 more
doaj +1 more source
Non-Relaxation Deep Hashing Method for Fast Image Retrieval
Deep hashing methods utilize an end-to-end framework to mutually learn feature representations and hash codes, thereby achieving a better retrieval performance.
Xiaofei Li
doaj +1 more source
Data Integrity is one of the primary concepts in information security. The main task of the cryptographic hash function is to assure the integrity of the transmitted data.
Mishal Almazrooie+5 more
doaj +1 more source
Efficient computation of hashes [PDF]
The sequential computation of hashes at the core of many distributed storage systems and found, for example, in grid services can hinder efficiency in service quality and even pose security challenges that can only be addressed by the use of parallel ...
+16 more
core +3 more sources
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main aim of this paper is how to increase the security level of the blockchain based on the increasing hashing algorithm security.
Salwa M. Serag Eldin+7 more
doaj +1 more source
Bottom-k and Priority Sampling, Set Similarity and Subset Sums with Minimal Independence [PDF]
We consider bottom-k sampling for a set X, picking a sample S_k(X) consisting of the k elements that are smallest according to a given hash function h. With this sample we can estimate the relative size f=|Y|/|X| of any subset Y as |S_k(X) intersect Y|/k.
Thorup, Mikkel
core +1 more source
A formal cyclopropylation of imines with cyclopropanols enables stereoselective access to cyclopropane‐embedded γ‐amino alcohols bearing three contiguous stereocenters. The transformation proceeds through a sequence of Mannich‐type addition and ring closure involving enolized zinc homoenolate, and is applicable to both N‐sulfonyl and chiral N‐sulfinyl ...
Kento Tsukiji+3 more
wiley +2 more sources