Sciweavers

268 search results - page 2 / 54
» An Analysis of Bitstate Hashing
Sort
View
ACNS
2011
Springer
254views Cryptology» more  ACNS 2011»
12 years 9 months ago
Linear Analysis of Reduced-Round CubeHash
Abstract. Recent developments in the field of cryptanalysis of hash functions has inspired NIST to announce a competition for selecting a new cryptographic hash function to join t...
Tomer Ashur, Orr Dunkelman
SPIN
2009
Springer
13 years 11 months ago
Fast, All-Purpose State Storage
Existing techniques for approximate storage of visited states in a model checker are too special-purpose and too DRAM-intensive. Bitstate hashing, based on Bloom filters, is good ...
Peter C. Dillinger, Panagiotis Manolios
ICDAR
2011
IEEE
12 years 4 months ago
Symbol Spotting in Line Drawings through Graph Paths Hashing
—In this paper we propose a symbol spotting technique through hashing the shape descriptors of graph paths (Hamiltonian paths). Complex graphical structures in line drawings can ...
Anjan Dutta, Josep Lladós, Umapada Pal
ICDAR
2011
IEEE
12 years 4 months ago
Recognizing Characters with Severe Perspective Distortion Using Hash Tables and Perspective Invariants
—In this paper, we present a novel method to recognize characters with severe perspective distortion using hash tables and perspective invariants. The proposed algorithm consists...
Pan Pan, Yuanping Zhu, Jun Sun 0004, Satoshi Naoi
IEEEIAS
2009
IEEE
13 years 12 months ago
Analysis of One-way Alterable Length Hash Function Based on Cell Neural Network
: In this paper, a hash function construction method based on cell neural network (CNN) with hyper-chaos characteristics is proposed. The chaos sequence is generated by iterating C...
Qun-ting Yang, Tie-gang Gao, Li Fan, Qiao-lun Gu