Sciweavers

713 search results - page 4 / 143
» Dispersing Hash Functions
Sort
View
FSE
2008
Springer
111views Cryptology» more  FSE 2008»
15 years 3 months ago
The Hash Function Family LAKE
The aim of this paper is to advocate a new software-oriented hash function family based on the HAIFA framework of Biham and Dunkelman, inheriting built-in randomized hashing and hi...
Jean-Philippe Aumasson, Willi Meier, Raphael C.-W....
CVPR
2012
IEEE
13 years 3 months ago
Spherical hashing
Many binary code encoding schemes based on hashing have been actively studied recently, since they can provide efficient similarity search, especially nearest neighbor search, an...
Jae-Pil Heo, Youngwoon Lee, Junfeng He, Shih-Fu Ch...
SODA
2008
ACM
104views Algorithms» more  SODA 2008»
15 years 2 months ago
Ranged hash functions and the price of churn
Ranged hash functions generalize hash tables to the setting where hash buckets may come and go over time, a typical case in distributed settings where hash buckets may correspond ...
James Aspnes, Muli Safra, Yitong Yin
SCN
2008
Springer
103views Communications» more  SCN 2008»
15 years 1 months ago
Full Cryptanalysis of LPS and Morgenstern Hash Functions
Collisions in the LPS cryptographic hash function of Charles, Goren and Lauter have been found by Z
Christophe Petit, Kristin Lauter, Jean-Jacques Qui...