Sciweavers

4438 search results - page 26 / 888
» On the Distribution of Keys by Hashing
Sort
View
ASIACRYPT
2008
Springer
15 years 1 months ago
Slide Attacks on a Class of Hash Functions
This paper studies the application of slide attacks to hash functions. Slide attacks have mostly been used for block cipher cryptanalysis. But, as shown in the current paper, they ...
Michael Gorski, Stefan Lucks, Thomas Peyrin
SIAMCOMP
2012
13 years 2 months ago
Tabulation-Based 5-Independent Hashing with Applications to Linear Probing and Second Moment Estimation
Abstract. In the framework of Carter and Wegman, a k-independent hash function maps any k keys independently. It is known that 5independent hashing provides good expected performan...
Mikkel Thorup, Yin Zhang
VLDB
1990
ACM
118views Database» more  VLDB 1990»
15 years 3 months ago
Distributed Linear Hashing and Parallel Projection in Main Memory Databases
This paper extends the conceptsof the distributed linear hashedmain memory file system with the objective of supportinghigher level parallel dambaseoperations. The basicdistribute...
Charles Severance, Sakti Pramanik, P. Wolberg
FODO
1993
Springer
147views Algorithms» more  FODO 1993»
15 years 3 months ago
Design and Implementation of DDH: A Distributed Dynamic Hashing Algorithm
Abstract. DDH extends the idea of dynamic hashing algorithms to distributed systems. DDH spreads data across multiple servers in a network using a novel autonomous location discove...
Robert Devine
MST
2006
136views more  MST 2006»
14 years 11 months ago
Simple Efficient Load-Balancing Algorithms for Peer-to-Peer Systems
Load balancing is a critical issue for the efficient operation of peerto-peer networks. We give two new load-balancing protocols whose provable performance guarantees are within a...
David R. Karger, Matthias Ruhl