Results 31 to 40 of about 10,475,631 (365)

The exponential hash function

open access: yesACM Journal of Experimental Algorithmics, 1997
In this paper an efficient open address hash function called exponential hashing is developed. The motivation for this hash function resulted from our ongoing efforts to apply dynamical systems theory to the study of hashing; however, the analysis conducted in this paper is primarily based on traditional number theory. Proofs of optimal table parameter
Chaouki T. Abdallah   +2 more
openaire   +2 more sources

Electron contact interlayers for low‐temperature‐processed crystalline silicon solar cells

open access: yesProgress in Photovoltaics: Research and Applications, EarlyView., 2023
In this study, a series of interlayers are trialed as electron‐selective contacts on crystalline silicon, including several materials that were previously untested in this application. Most of these interlayers were found to achieve mΩcm2‐scale specific contact resistivities.
Jesus Ibarra Michel   +11 more
wiley   +1 more source

Analysis of the amplitude form of the quantum hash function

open access: yesУчёные записки Казанского университета: Серия Физико-математические науки, 2023
In this article, the properties of quantum hash functions are further explored. Previous findings show that so-called small-bias sets (special subsets of the set of elements of a cyclic group) generate a “phase” quantum hash function. Here, it was proved
M. F. Ablayev   +2 more
doaj   +1 more source

Theoretical and Experimental Analysis of Cryptographic Hash Functions

open access: yesJournal of Telecommunications and Information Technology, 2019
The paper presents a theoretical introduction to the cryptographic hash function theory and a statistical experimental analysis of selected hash functions.
Jacek Tchórzewsk   +1 more
doaj   +1 more source

Non-Relaxation Deep Hashing Method for Fast Image Retrieval

open access: yesIEEE Access, 2023
Deep hashing methods utilize an end-to-end framework to mutually learn feature representations and hash codes, thereby achieving a better retrieval performance.
Xiaofei Li
doaj   +1 more source

Integrity verification for digital Holy Quran verses using cryptographic hash function and compression

open access: yesJournal of King Saud University: Computer and Information Sciences, 2020
Data Integrity is one of the primary concepts in information security. The main task of the cryptographic hash function is to assure the integrity of the transmitted data.
Mishal Almazrooie   +5 more
doaj   +1 more source

Efficient computation of hashes [PDF]

open access: yes, 2014
The sequential computation of hashes at the core of many distributed storage systems and found, for example, in grid services can hinder efficiency in service quality and even pose security challenges that can only be addressed by the use of parallel ...
  +16 more
core   +3 more sources

Design and Analysis of New Version of Cryptographic Hash Function Based on Improved Chaotic Maps With Induced DNA Sequences

open access: yesIEEE Access, 2023
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main aim of this paper is how to increase the security level of the blockchain based on the increasing hashing algorithm security.
Salwa M. Serag Eldin   +7 more
doaj   +1 more source

Bottom-k and Priority Sampling, Set Similarity and Subset Sums with Minimal Independence [PDF]

open access: yes, 2013
We consider bottom-k sampling for a set X, picking a sample S_k(X) consisting of the k elements that are smallest according to a given hash function h. With this sample we can estimate the relative size f=|Y|/|X| of any subset Y as |S_k(X) intersect Y|/k.
Thorup, Mikkel
core   +1 more source

Formal Cyclopropylation of Imines with Cyclopropanols: Stereocontrolled Access to Conformationally Constrained γ‐Amino Alcohols

open access: yesAngewandte Chemie, EarlyView.
A formal cyclopropylation of imines with cyclopropanols enables stereoselective access to cyclopropane‐embedded γ‐amino alcohols bearing three contiguous stereocenters. The transformation proceeds through a sequence of Mannich‐type addition and ring closure involving enolized zinc homoenolate, and is applicable to both N‐sulfonyl and chiral N‐sulfinyl ...
Kento Tsukiji   +3 more
wiley   +2 more sources

Home - About - Disclaimer - Privacy