Results 181 to 190 of about 945,337 (242)
Some of the next articles are maybe not open access.
Energy Scalable Universal Hashing
IEEE Transactions on Computers, 2005Message authentication codes (MACs) are valuable tools for ensuring the integrity of messages. MACs may be built around a universal hash function (NH) which was explored in the construction of UMAC. In this paper, we use a variation on NH called WH. WH reaches optimally in the sense that it is universal with half the hash length of NH and it achieves ...
J. Kaps, K. Yuksel, B. Sunar
openaire +2 more sources
Quantum Hashing via ε-Universal Hashing Constructions and Freivalds’ Fingerprinting Schemas
Workshop on Descriptional Complexity of Formal Systems, 2014We define the concept of a quantum hash generator and offer a design, which allows one to build a large number of different quantum hash functions. The construction is based on composition of a classical ε-universal hash family and a given family of functions - quantum hash generators.
Ablayev F., Ablayev M.
openaire +4 more sources
Reducing DRAM Refresh Rate Using Retention Time Aware Universal Hashing Redundancy Repair
ACM Trans. Design Autom. Electr. Syst., 2019As the device capacity of Dynamic Random Access Memory (DRAM) increases, refresh operation becomes a significant contributory factor toward total power consumption and memory throughput of the device.
Kyu Hyun Choi +3 more
semanticscholar +1 more source
Universal hash functions for an infinite universe and hash trees
Information Processing Letters, 2009zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +1 more source
Hashing practice: analysis of hashing and universal hashing
ACM SIGMOD Record, 1988Much of the literature on hashing deals with overflow handling (collision resolution) techniques and its analysis. What does all the analytical results mean in practice and how can they be achieved with practical files? This paper considers the problem of achieving analytical performance of hashing techniques in practice with reference to successful ...
openaire +1 more source
ROSE: Relational and Prototypical Structure Learning for Universal Domain Adaptive Hashing
IEEE Transactions on Information Forensics and SecurityAs an important problem in searching system development, domain adaptive retrieval seeks to train a retrieval model with both labeled source samples and unlabeled target samples.
Xinlong Yang +7 more
semanticscholar +1 more source
Exploring Targeted Universal Adversarial Attack for Deep Hashing
IEEE International Conference on Acoustics, Speech, and Signal ProcessingAlthough image-dependent adversarial attacks have been studied, the more challenging image-agnostic adversarial attack for deep hashing remains an unexplored territory. In this paper, we take the first attempt on the more efficient and malicious targeted
Fei Zhu +5 more
semanticscholar +1 more source
Quantum Hashing via Classical $��$-universal Hashing Constructions
2014In the paper, we define the concept of the quantum hash generator and offer design, which allows to build a large amount of different quantum hash functions. The construction is based on composition of classical $ $-universal hash family and a given family of functions -- quantum hash generator.
Ablayev, Farid, Ablayev, Marat
openaire +1 more source

