Results 61 to 70 of about 569,401 (216)

Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses [PDF]

open access: yes, 2023
Most cryptographic protocols use cryptographic hash functions as a building block. The security analyses of these protocols typically assume that the hash functions are perfect (such as in the random oracle model).
Cheval, Vincent   +5 more
core  

Mercury BLAST dictionaries: analysis and performance measurement [PDF]

open access: yes, 2007
This report describes a hashing scheme for a dictionary of short bit strings. The scheme, which we call near-perfect hashing, was designed as part of the construction of Mercury BLAST, an FPGA-based accelerator for the BLAST family of biosequence ...
Buhler, Jeremy
core   +1 more source

Blockchain technology disruptions: Exploring accounting and auditing academics and practitioners' perception

open access: yesAccounting &Finance, EarlyView.
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo   +3 more
wiley   +1 more source

Simple, compact and robust approximate string dictionary [PDF]

open access: yes, 2014
This paper is concerned with practical implementations of approximate string dictionaries that allow edit errors. In this problem, we have as input a dictionary $D$ of $d$ strings of total length $n$ over an alphabet of size $\sigma$.
Belazzougui, Djamal, Chegrane, Ibrahim
core   +1 more source

Parallel Recursive State Compression for Free [PDF]

open access: yes, 2011
This paper focuses on reducing memory usage in enumerative model checking, while maintaining the multi-core scalability obtained in earlier work. We present a tree-based multi-core compression method, which works by leveraging sharing among sub-vectors ...
A. Laarman   +14 more
core   +6 more sources

Independent Effects of Age, Education, Verbal Working Memory, Motor Speed of Processing, Locality, and Morphosyntactic Category on Verb‐Related Morphosyntactic Production: Evidence From Healthy Aging

open access: yesTopics in Cognitive Science, EarlyView.
Abstract This study investigates the role of locality (a task/material‐related variable), demographic factors (age, education, and sex), cognitive capacities (verbal working memory [WM], verbal short‐term memory [STM], speed of processing [SOP], and inhibition), and morphosyntactic category (time reference and grammatical aspect) in verb‐related ...
Marielena Soilemezidi   +3 more
wiley   +1 more source

Societal Trends and Opportunities in the Aftermath of the Nova Psychedelic Trance Rave, Through Lilla and Benjamin

open access: yesFuture Humanities, Volume 3, Issue 1, May 2025.
ABSTRACT This fiction article is about trauma and grief, resilience and the celebration of life. It also addresses the role psychedelics can play in bringing about change in our traumatized society by inspiring us and showing us how to use the present as a possibility for fundamental transformation.
Demian Halperin   +5 more
wiley   +1 more source

Finding succinct ordered minimal perfect hash functions [PDF]

open access: yesInformation Processing Letters, 1994
Abstract An ordered minimal perfect hash table is one in which no collisions occur among a predefined set of keys, no space is unused and the data are placed in the table in order. A new method for creating ordered minimal perfect hash functions is presented.
Steven S. Seiden, Daniel S. Hirschberg
openaire   +2 more sources

A Simple Hash Class with Strong Randomness Properties in Graphs and Hypergraphs [PDF]

open access: yesarXiv, 2016
We study randomness properties of graphs and hypergraphs generated by simple hash functions. Several hashing applications can be analyzed by studying the structure of $d$-uniform random ($d$-partite) hypergraphs obtained from a set $S$ of $n$ keys and $d$ randomly chosen hash functions $h_1,\dots,h_d$ by associating each key $x\in S$ with a hyperedge $\
arxiv  

Finding state-of-the-art non-cryptographic hashes with genetic programming [PDF]

open access: yes, 2006
Proceding of: 9th International Conference, Reykjavik, Iceland, September 9-13, 2006.The design of non-cryptographic hash functions by means of evolutionary computation is a relatively new and unexplored problem.
Estébanez Tascón, César   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy