Results 1 to 10 of about 902,139 (199)

Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication

open access: diamondIACR Transactions on Symmetric Cryptology, 2023
In this paper we introduce a new keyed hash function based on 32-bit integer multiplication that we call Multimixer-128. In our approach, we follow the key-then-hash parallel paradigm. So, we first add a variable length input message to a secret key and
Koustabh Ghosh   +2 more
doaj   +4 more sources

Regular and almost universal hashing: an efficient implementation [PDF]

open access: greenSoftware, Practice & Experience, 2016
Random hashing can provide guarantees regarding the performance of data structures such as hash tables---even in an adversarial setting. Many existing families of hash functions are universal: given two data objects, the probability that they have the ...
Ignatchenko, Sergey   +2 more
core   +6 more sources

QKD parameter estimation by two-universal hashing [PDF]

open access: yesQuantum, 2023
This paper proposes and proves security of a QKD protocol which uses two-universal hashing instead of random sampling to estimate the number of bit flip and phase flip errors.
Dimiter Ostrev
doaj   +3 more sources

The universality of iterated hashing over variable-length strings [PDF]

open access: bronze, 2011
Iterated hash functions process strings recursively, one character at a time. At each iteration, they compute a new hash value from the preceding hash value and the next character.
Byers   +20 more
core   +3 more sources

Explicit Orthogonal Arrays and Universal Hashing with Arbitrary Parameters [PDF]

open access: bronzeSymposium on the Theory of Computing
Orthogonal arrays are a type of combinatorial design that emerged in the 1940s in the design of statistical experiments. In 1947, Rao proved a lower bound on the size of any orthogonal array, and raised the problem of constructing arrays of minimum size.
Nicholas J. A. Harvey, Arvin Sahami
openalex   +3 more sources

Chip-integrated quantum signature network over 200 km [PDF]

open access: yesLight: Science & Applications
The development of quantum networks is paramount towards practical and secure communications. Quantum digital signatures (QDS) offer an information-theoretically secure solution for ensuring data integrity, authenticity, and non-repudiation, rapidly ...
Yongqiang Du   +9 more
doaj   +2 more sources

Faster 64-bit universal hashing using carry-less multiplications [PDF]

open access: yesJournal of Cryptographic Engineering, 2015
Intel and AMD support the Carry-less Multiplication (CLMUL) instruction set in their x64 processors. We use CLMUL to implement an almost universal 64-bit hash family (CLHASH).
Kaser, Owen, Lemire, Daniel
core   +3 more sources

Fractional hitting sets for efficient multiset sketching [PDF]

open access: yesAlgorithms for Molecular Biology
The exponential increase in publicly available sequencing data and genomic resources necessitates the development of highly efficient methods for data processing and analysis.
TimothĂ© RouzĂ©   +3 more
doaj   +2 more sources

Inaccessible Entropy II: IE Functions and Universal One-Way Hashing [PDF]

open access: greenTheory of Computing, 2021
This paper uses a variant of the notion of inaccessible entropy (Haitner, Reingold, Vadhan and Wee, STOC 2009), to give an alternative construction and proof for the fundamental result, first proved by Rompel (STOC 1990), that Universal One-Way Hash ...
Iftach Haitner   +4 more
openalex   +3 more sources

Universal Hashing for Information Theoretic Security [PDF]

open access: yesProceedings of the IEEE, 2016
The information theoretic approach to security entails harnessing the correlated randomness available in nature to establish security. It uses tools from information theory and coding and yields provable security, even against an adversary with unbounded
Tyagi, Himanshu, Vardy, Alexander
core   +2 more sources

Home - About - Disclaimer - Privacy