Hash function

Results: 1800



#Item
31Space-Efficient Randomized Algorithms for K-SUM Joshua R. Wang Stanford University, Stanford CA 94305, USA

Space-Efficient Randomized Algorithms for K-SUM Joshua R. Wang Stanford University, Stanford CA 94305, USA

Add to Reading List

Source URL: web.stanford.edu

Language: English - Date: 2014-04-18 04:16:48
32Proceedings  - NN - Analysing the Molva and Di Pietro Private RFID Authentication Scheme

Proceedings - NN - Analysing the Molva and Di Pietro Private RFID Authentication Scheme

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:38:30
33Why Simple Hash Functions Work: Exploiting the Entropy in a Data Stream

Why Simple Hash Functions Work: Exploiting the Entropy in a Data Stream

Add to Reading List

Source URL: theoryofcomputing.org

Language: English - Date: 2014-11-14 13:01:16
34Finding Highly Correlated Pairs Efficiently with Powerful Pruning ∗ Joan Feigenbaum

Finding Highly Correlated Pairs Efficiently with Powerful Pruning ∗ Joan Feigenbaum

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2006-08-31 13:51:39
35LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez Tapiador, and Arturo Ribagorda Computer Science Department, Carlos III Unive

LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez Tapiador, and Arturo Ribagorda Computer Science Department, Carlos III Unive

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-07-05 11:52:34
36Practical Cryptanalysis of iso/iecand emv Signatures⋆ Jean-S´ebastien Coron1 , David Naccache2 , Mehdi Tibouchi2 , and Ralf-Philipp Weinmann1 1 Universit´e du Luxembourg 6, rue Richard Coudenhove-Kalergi l-13

Practical Cryptanalysis of iso/iecand emv Signatures⋆ Jean-S´ebastien Coron1 , David Naccache2 , Mehdi Tibouchi2 , and Ralf-Philipp Weinmann1 1 Universit´e du Luxembourg 6, rue Richard Coudenhove-Kalergi l-13

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-05-10 09:46:08
37Selective Hashing: Closing the Gap between Radius Search and k-NN Search Jinyang Gao‡ H. V. Jagadish§

Selective Hashing: Closing the Gap between Radius Search and k-NN Search Jinyang Gao‡ H. V. Jagadish§

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2015-06-06 09:21:03
38SILT: A Memory-Efficient, High-Performance Key-Value Store

SILT: A Memory-Efficient, High-Performance Key-Value Store

Add to Reading List

Source URL: www.sigops.org

Language: English - Date: 2011-09-20 03:36:42
39Microsoft PowerPoint - Lect12advanced_data.ppt

Microsoft PowerPoint - Lect12advanced_data.ppt

Add to Reading List

Source URL: sicp.csail.mit.edu

Language: English - Date: 2005-10-17 09:39:31
40Efficient Parallel Set-Similarity Joins Using MapReduce

Efficient Parallel Set-Similarity Joins Using MapReduce

Add to Reading List

Source URL: asterixdb.ics.uci.edu

Language: English - Date: 2013-06-06 15:43:58