Finding and Applying Perfect Hash Functions
openaire +1 more source
Security Authentication Scheme for Vehicle-to-Everything Computing Task Offloading Environments. [PDF]
Liu Y, Li C, Sun Q, Jiang H.
europepmc +1 more source
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems. [PDF]
Gladis Kurian M, Chen Y.
europepmc +1 more source
Resilient cybersecurity in smart grid ICS communication using BLAKE3-driven dynamic key rotation and intrusion detection. [PDF]
Dokku NS +5 more
europepmc +1 more source
LEND and Faster Algorithms for Constructing Minimal Perfect Hash Functions [PDF]
Edward A. Fox, Qi Chen, Lenwood S. Heath
openalex
Ethical AI in Healthcare: Integrating Zero-Knowledge Proofs and Smart Contracts for Transparent Data Governance. [PDF]
Ezz M, Alaerjan AS, Mostafa AM.
europepmc +1 more source
An O(n log n) Algorithm for Finding Minimal Perfect Hash Functions [PDF]
Edward A. Fox, Lenwood S. Heath, Qi Chen
openalex
Symbolic and Explicit Search Hybrid through Perfect Hash Functions — A Case Study in Connect Four
Stefan Edelkamp +2 more
openalex +2 more sources

