Results 61 to 70 of about 569,401 (216)
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses [PDF]
Most cryptographic protocols use cryptographic hash functions as a building block. The security analyses of these protocols typically assume that the hash functions are perfect (such as in the random oracle model).
Cheval, Vincent+5 more
core
Mercury BLAST dictionaries: analysis and performance measurement [PDF]
This report describes a hashing scheme for a dictionary of short bit strings. The scheme, which we call near-perfect hashing, was designed as part of the construction of Mercury BLAST, an FPGA-based accelerator for the BLAST family of biosequence ...
Buhler, Jeremy
core +1 more source
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo+3 more
wiley +1 more source
Simple, compact and robust approximate string dictionary [PDF]
This paper is concerned with practical implementations of approximate string dictionaries that allow edit errors. In this problem, we have as input a dictionary $D$ of $d$ strings of total length $n$ over an alphabet of size $\sigma$.
Belazzougui, Djamal, Chegrane, Ibrahim
core +1 more source
Parallel Recursive State Compression for Free [PDF]
This paper focuses on reducing memory usage in enumerative model checking, while maintaining the multi-core scalability obtained in earlier work. We present a tree-based multi-core compression method, which works by leveraging sharing among sub-vectors ...
A. Laarman+14 more
core +6 more sources
Abstract This study investigates the role of locality (a task/material‐related variable), demographic factors (age, education, and sex), cognitive capacities (verbal working memory [WM], verbal short‐term memory [STM], speed of processing [SOP], and inhibition), and morphosyntactic category (time reference and grammatical aspect) in verb‐related ...
Marielena Soilemezidi+3 more
wiley +1 more source
ABSTRACT This fiction article is about trauma and grief, resilience and the celebration of life. It also addresses the role psychedelics can play in bringing about change in our traumatized society by inspiring us and showing us how to use the present as a possibility for fundamental transformation.
Demian Halperin+5 more
wiley +1 more source
Finding succinct ordered minimal perfect hash functions [PDF]
Abstract An ordered minimal perfect hash table is one in which no collisions occur among a predefined set of keys, no space is unused and the data are placed in the table in order. A new method for creating ordered minimal perfect hash functions is presented.
Steven S. Seiden, Daniel S. Hirschberg
openaire +2 more sources
A Simple Hash Class with Strong Randomness Properties in Graphs and Hypergraphs [PDF]
We study randomness properties of graphs and hypergraphs generated by simple hash functions. Several hashing applications can be analyzed by studying the structure of $d$-uniform random ($d$-partite) hypergraphs obtained from a set $S$ of $n$ keys and $d$ randomly chosen hash functions $h_1,\dots,h_d$ by associating each key $x\in S$ with a hyperedge $\
arxiv
Finding state-of-the-art non-cryptographic hashes with genetic programming [PDF]
Proceding of: 9th International Conference, Reykjavik, Iceland, September 9-13, 2006.The design of non-cryptographic hash functions by means of evolutionary computation is a relatively new and unexplored problem.
Estébanez Tascón, César+3 more
core +2 more sources