Results 181 to 190 of about 945,337 (242)
Some of the next articles are maybe not open access.

Energy Scalable Universal Hashing

IEEE Transactions on Computers, 2005
Message authentication codes (MACs) are valuable tools for ensuring the integrity of messages. MACs may be built around a universal hash function (NH) which was explored in the construction of UMAC. In this paper, we use a variation on NH called WH. WH reaches optimally in the sense that it is universal with half the hash length of NH and it achieves ...
J. Kaps, K. Yuksel, B. Sunar
openaire   +2 more sources

Quantum Hashing via ε-Universal Hashing Constructions and Freivalds’ Fingerprinting Schemas

Workshop on Descriptional Complexity of Formal Systems, 2014
We define the concept of a quantum hash generator and offer a design, which allows one to build a large number of different quantum hash functions. The construction is based on composition of a classical ε-universal hash family and a given family of functions - quantum hash generators.
Ablayev F., Ablayev M.
openaire   +4 more sources

Universal Hashing

The Joys of Hashing, 2019
T. Mailund
openaire   +2 more sources

Reducing DRAM Refresh Rate Using Retention Time Aware Universal Hashing Redundancy Repair

ACM Trans. Design Autom. Electr. Syst., 2019
As the device capacity of Dynamic Random Access Memory (DRAM) increases, refresh operation becomes a significant contributory factor toward total power consumption and memory throughput of the device.
Kyu Hyun Choi   +3 more
semanticscholar   +1 more source

Universal hash functions for an infinite universe and hash trees

Information Processing Letters, 2009
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +1 more source

Hashing practice: analysis of hashing and universal hashing

ACM SIGMOD Record, 1988
Much of the literature on hashing deals with overflow handling (collision resolution) techniques and its analysis. What does all the analytical results mean in practice and how can they be achieved with practical files? This paper considers the problem of achieving analytical performance of hashing techniques in practice with reference to successful ...
openaire   +1 more source

ROSE: Relational and Prototypical Structure Learning for Universal Domain Adaptive Hashing

IEEE Transactions on Information Forensics and Security
As an important problem in searching system development, domain adaptive retrieval seeks to train a retrieval model with both labeled source samples and unlabeled target samples.
Xinlong Yang   +7 more
semanticscholar   +1 more source

Exploring Targeted Universal Adversarial Attack for Deep Hashing

IEEE International Conference on Acoustics, Speech, and Signal Processing
Although image-dependent adversarial attacks have been studied, the more challenging image-agnostic adversarial attack for deep hashing remains an unexplored territory. In this paper, we take the first attempt on the more efficient and malicious targeted
Fei Zhu   +5 more
semanticscholar   +1 more source

Quantum Hashing via Classical $��$-universal Hashing Constructions

2014
In the paper, we define the concept of the quantum hash generator and offer design, which allows to build a large amount of different quantum hash functions. The construction is based on composition of classical $ $-universal hash family and a given family of functions -- quantum hash generator.
Ablayev, Farid, Ablayev, Marat
openaire   +1 more source

Home - About - Disclaimer - Privacy