Results 21 to 30 of about 115,913 (217)

GPERF : a perfect hash function generator [PDF]

open access: yes, 1992
gperf is a widely available perfect hash function generator written in C++. It automates a common system software operation: keyword recognition. gperf translates an n element user-specified keyword list keyfile into source code containing a k element ...
Schmidt, Douglas C., Suda, Tatsuya
core   +2 more sources

Comprehensive Performance Study of Hashing Functions [PDF]

open access: yesComputer Science Journal of Moldova, 2023
Most literature on hashing functions speaks in terms of hashing functions being either ‘good’ or ‘bad’. In this paper, we demonstrate how a hashing function that gives good results for one key set, performs badly for another.
G. M. Sridevi   +2 more
doaj   +1 more source

Minimal perfect hash functions in large scale bioinformatics Problem

open access: green, 2016
. Genomic and metagenomic fields, generating huge sets ofshort genomic sequences, brought their own share of high performanceproblems. To extract relevant pieces of information from the huge datasets generated by current sequencing techniques, one must rely on extremelyscalable methods and solutions. Indexing billions of objects isa task considered too
Antoine Limasset   +3 more
openalex   +3 more sources

A novel subset-based polynomial design for enhancing the security of short message-digest with inflated avalanche and random responses

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
The data breach and the integrity violation of remote data remain significant issues in the domain of information security. A provably-secure hash function aids in providing solutions to integrity-related issues.
P. Karthik   +5 more
doaj   +1 more source

XOR Chain and Perfect Secrecy at the Dawn of the Quantum Era

open access: yesCryptography, 2023
In this article, we present a new method that achieves Shannon’s perfect secrecy. To achieve this property, we will introduce the triple XOR cancellation rule. The approach has two execution modes: digital signature and data encryption.
Luis Adrián Lizama-Pérez
doaj   +1 more source

General encoding of canonical k-mers

open access: yesPeer Community Journal, 2023
To index or compare sequences efficiently, often k-mers, i.e., substrings of fixed length k, are used. For efficient indexing or storage, k-mers are often encoded as integers, e.g., applying some bijective mapping between all possible σk k-mers and the ...
Wittler, Roland
doaj   +1 more source

A Dynamic Repository Approach for Small File Management With Fast Access Time on Hadoop Cluster: Hash Based Extended Hadoop Archive

open access: yesIEEE Access, 2022
Small file processing in Hadoop is one of the challenging task. The performance of the Hadoop is quite good when dealing with large files because they require lesser metadata and consume less memory. But while dealing with enormous amount of small files,
Vijay Shankar Sharma   +4 more
doaj   +1 more source

A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks

open access: yesSensors, 2021
Recently, many Low Power Wide Area Network (LPWAN) protocols have been proposed for securing resource-constrained Internet of Things (IoT) devices with negligible power consumption.
Shimaa A. Abdel Hakeem   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy