Results 21 to 30 of about 118,403 (212)

Finding succinct ordered minimal perfect hashing functions [PDF]

open access: yes, 1992
An ordered minimal perfect hash table is one in which no collisions occur among a predefined set of keys, no space is unused, and the data are placed in the table in order. A new method for creating ordered minimal perfect hashing functions is presented.
Hirschberg, Daniel S., Seiden, Steven S.
core   +2 more sources

High Performance Construction of RecSplit Based Minimal Perfect Hash Functions [PDF]

open access: yesEmbedded Systems and Applications, 2022
A minimal perfect hash function (MPHF) bijectively maps a set S of objects to the first |S| integers. It can be used as a building block in databases and data compression.
Dominik Bez   +3 more
semanticscholar   +1 more source

Comprehensive Performance Study of Hashing Functions [PDF]

open access: yesComputer Science Journal of Moldova, 2023
Most literature on hashing functions speaks in terms of hashing functions being either ‘good’ or ‘bad’. In this paper, we demonstrate how a hashing function that gives good results for one key set, performs badly for another.
G. M. Sridevi   +2 more
doaj   +1 more source

A novel subset-based polynomial design for enhancing the security of short message-digest with inflated avalanche and random responses

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
The data breach and the integrity violation of remote data remain significant issues in the domain of information security. A provably-secure hash function aids in providing solutions to integrity-related issues.
P. Karthik   +5 more
doaj   +1 more source

XOR Chain and Perfect Secrecy at the Dawn of the Quantum Era

open access: yesCryptography, 2023
In this article, we present a new method that achieves Shannon’s perfect secrecy. To achieve this property, we will introduce the triple XOR cancellation rule. The approach has two execution modes: digital signature and data encryption.
Luis Adrián Lizama-Pérez
doaj   +1 more source

General encoding of canonical k-mers

open access: yesPeer Community Journal, 2023
To index or compare sequences efficiently, often k-mers, i.e., substrings of fixed length k, are used. For efficient indexing or storage, k-mers are often encoded as integers, e.g., applying some bijective mapping between all possible σk k-mers and the ...
Wittler, Roland
doaj   +1 more source

A Dynamic Repository Approach for Small File Management With Fast Access Time on Hadoop Cluster: Hash Based Extended Hadoop Archive

open access: yesIEEE Access, 2022
Small file processing in Hadoop is one of the challenging task. The performance of the Hadoop is quite good when dealing with large files because they require lesser metadata and consume less memory. But while dealing with enormous amount of small files,
Vijay Shankar Sharma   +4 more
doaj   +1 more source

A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks

open access: yesSensors, 2021
Recently, many Low Power Wide Area Network (LPWAN) protocols have been proposed for securing resource-constrained Internet of Things (IoT) devices with negligible power consumption.
Shimaa A. Abdel Hakeem   +2 more
doaj   +1 more source

Secure Authentication in the Smart Grid

open access: yesMathematics, 2022
Authenticated key agreement is a process in which protocol participants communicate over a public channel to share a secret session key, which is then used to encrypt data transferred in subsequent communications.
Mehdi Hosseinzadeh   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy