Results 191 to 200 of about 945,337 (242)
Some of the next articles are maybe not open access.
Weaknesses of Cuckoo Hashing with a Simple Universal Hash Class: The Case of Large Universes
2009Cuckoo hashing was introduced by Pagh and Rodler in 2001 [12]. A set S of n keys is stored in two tables T 1 and T 2 each of which has m cells of capacity 1 such that constant access time is guaranteed. For m ≥ (1 + e)n and hash functions h 1, h 2 that are c logn-wise independent, Pagh [11] showed that the keys of an arbitrary set S can be stored using
Martin Dietzfelbinger, Ulf Schellbach
openaire +1 more source
Universally composable anonymous Hash certification model
Science in China Series F: Information Sciences, 2007zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Zhang, Fan, Ma, Jianfeng, Moon, Sangjae
openaire +2 more sources
2006
A problem is presented with deterministic VLSI complexity AT det 2 =Ω(N2), but Las Vegas complexity only AT Las Vegas 2 =O (N poly(logN)). (The Las Vegas algorithm always decides correctly, but T is only the expected running time; A is the area of the chip).
openaire +1 more source
A problem is presented with deterministic VLSI complexity AT det 2 =Ω(N2), but Las Vegas complexity only AT Las Vegas 2 =O (N poly(logN)). (The Las Vegas algorithm always decides correctly, but T is only the expected running time; A is the area of the chip).
openaire +1 more source
IEEE transactions on circuits and systems for video technology (Print)
Deep Hashing (DH) based image retrieval is commonly used in facial recognition systems for its precision and effectiveness. However, this convenience is accompanied by a mounting threat to privacy.
Long Tang +5 more
semanticscholar +1 more source
Deep Hashing (DH) based image retrieval is commonly used in facial recognition systems for its precision and effectiveness. However, this convenience is accompanied by a mounting threat to privacy.
Long Tang +5 more
semanticscholar +1 more source
2012
Universal hash functions are important building blocks for unconditionally secure message authentication codes. In this paper, we present a new construction of a class of e-Almost Strongly Universal2 hash functions with much smaller description (or key) length than the Wegman-Carter construction.
Aysajan Abidin, Jan-Åke Larsson
openaire +1 more source
Universal hash functions are important building blocks for unconditionally secure message authentication codes. In this paper, we present a new construction of a class of e-Almost Strongly Universal2 hash functions with much smaller description (or key) length than the Wegman-Carter construction.
Aysajan Abidin, Jan-Åke Larsson
openaire +1 more source
Universal Hashing Based on Field Multiplication and (Near-)MDS Matrices
IACR Cryptology ePrint Archive, 2023Koustabh Ghosh +3 more
semanticscholar +1 more source
Universal Hash-Function Families: From Hashing to Authentication
2014Due to their potential use as building blocks for constructing highly efficient message authentication codes (MACs), universal hash-function families have been attracting increasing research attention, both from the design and analysis points of view.
openaire +1 more source
On aspects of university and performance for closed hashing
Proceedings of the twenty-first annual ACM symposium on Theory of computing - STOC '89, 1989We consider two hashing models for storing a set S ⊂ {0, 1, 2, …, m - 1} in a table T of size n.The first model uses universal hashing for a partially loaded table. A set of hash functions is universal if, for any the input set, a randomly selected function has an efficient expected performance.
J. P. Schmidt, A. Siegel
openaire +1 more source
A new universal class of hash functions and dynamic hashing in real time
2005The paper presents a new universal class of hash functions which have many desirable features of random functions, but can be (probabilistically) constructed using sublinear time and space, and can be evaluated in constant time.
Martin Dietzfelbinger +1 more
openaire +1 more source
Multimixer-156: Universal Keyed Hashing Based on Integer Multiplication and Cyclic Shift
International Conference on Cryptology in India, 2023Koustabh Ghosh +2 more
semanticscholar +1 more source

