Sciweavers

713 search results - page 52 / 143
» Dispersing Hash Functions
Sort
View
CTRSA
2006
Springer
129views Cryptology» more  CTRSA 2006»
15 years 1 months ago
An Optimal Non-interactive Message Authentication Protocol
Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SASbased non-interactive message aut...
Sylvain Pasini, Serge Vaudenay
58
Voted
CORR
2010
Springer
62views Education» more  CORR 2010»
14 years 9 months ago
A Derandomized Sparse Johnson-Lindenstrauss Transform
Recent work of [Dasgupta-Kumar-Sarl
Daniel M. Kane, Jelani Nelson
ISW
2000
Springer
15 years 1 months ago
Weighted One-Way Hash Chain and Its Applications
An one-way hash chain generated by the iterative use of a one-way hash function on a secret value has recently been widely employed to develop many practical cryptographic solution...
Sung-Ming Yen, Yuliang Zheng
ICCV
2003
IEEE
15 years 11 months ago
Fast Pose Estimation with Parameter-Sensitive Hashing
Example-based methods are effective for parameter estimation problems when the underlying system is simple or the dimensionality of the input is low. For complex and high-dimensio...
Gregory Shakhnarovich, Paul A. Viola, Trevor Darre...
CVPR
2010
IEEE
15 years 5 months ago
SPEC Hashing: Similarity Preserving algorithm for Entropy-based Coding
Searching approximate nearest neighbors in large scale high dimensional data set has been a challenging problem. This paper presents a novel and fast algorithm for learning binary...
Ruei-Sung Lin, David Ross, Jay Yagnik