Results 241 to 250 of about 123,825 (281)
Some of the next articles are maybe not open access.
2019
The main topic of this book is implementing hash tables; it’s only secondarily about hash functions. This is why you have assumed a priori that you have uniformly distributed hash keys. In reality, this is unlikely to be the case; real data are rarely random samples from the space of possible data values.
openaire +1 more source
The main topic of this book is implementing hash tables; it’s only secondarily about hash functions. This is why you have assumed a priori that you have uniformly distributed hash keys. In reality, this is unlikely to be the case; real data are rarely random samples from the space of possible data values.
openaire +1 more source
European Transactions on Telecommunications, 1994
AbstractHash functions were introduced in cryptology in the late seventies as a tool to protect the authenticity of information. Soon it became clear that they were a very useful building block to solve other security problems in telecommunication and computer networks.
openaire +1 more source
AbstractHash functions were introduced in cryptology in the late seventies as a tool to protect the authenticity of information. Soon it became clear that they were a very useful building block to solve other security problems in telecommunication and computer networks.
openaire +1 more source
2020
Don't get intimidated by the title of this chapter. The theory of cryptographic hash functions is not particularly abstruse. What is difficult is the construction of these functions from scratch. However, we need not concern ourselves with this aspect of the mathematical theory since most programming language libraries provide us with a good selection ...
openaire +1 more source
Don't get intimidated by the title of this chapter. The theory of cryptographic hash functions is not particularly abstruse. What is difficult is the construction of these functions from scratch. However, we need not concern ourselves with this aspect of the mathematical theory since most programming language libraries provide us with a good selection ...
openaire +1 more source
Deep Cross-Modal Hashing With Hashing Functions and Unified Hash Codes Jointly Learning
IEEE Transactions on Knowledge and Data Engineering, 2022Xian-Ling Mao, Yong Hu, Wei Wei
exaly
2001
In this chapter, we discuss cryptographic hash functions. They are used, for example, in digital signatures. Throughout this chapter, we assume that Σ is an alphabet.
openaire +1 more source
In this chapter, we discuss cryptographic hash functions. They are used, for example, in digital signatures. Throughout this chapter, we assume that Σ is an alphabet.
openaire +1 more source
Efficient chameleon hash functions in the enhanced collision resistant model
Information Sciences, 2020Mohammad Dakhilalian, Willy Susilo
exaly
Construction of one-way hash functions with increased key space using adaptive chaotic maps
Chaos, Solitons and Fractals, 2020Aleksandra V Tutueva +2 more
exaly
Applying Grover's Algorithm to Hash Functions: A Software Perspective
IEEE Transactions on Quantum Engineering, 2022Richard Preston
exaly

