Hash function

Results: 1800



#Item
781Searching / Image search / Machine learning / Hash function / Image retrieval / Locality-sensitive hashing / Nearest neighbor search / Hash table / Tf*idf / Information science / Search algorithms / Information retrieval

Bundle Min-Hashing for Logo Recognition Stefan Romberg Rainer Lienhart Multimedia Computing and Computer Vision Lab

Add to Reading List

Source URL: www.multimedia-computing.de

Language: English - Date: 2013-04-27 13:50:11
782Randomness / Pseudorandomness / Pseudorandom number generators / Computational complexity theory / Random number generation / Cryptographic hash function / Hash function / Fortuna / Pseudorandom generator / Cryptography / Theoretical computer science / Applied mathematics

Chalmers Publication Library Splittable Pseudorandom Number Generators using Cryptographic Hashing This document has been downloaded from Chalmers Publication Library (CPL). It is the author´s version of a work that was

Add to Reading List

Source URL: publications.lib.chalmers.se

Language: English - Date: 2013-09-18 07:30:31
783Arrays / Hashing / Data / Associative arrays / Bloom filter / Hash table / Trie / Lookup table / Hash function / Search algorithms / Computing / Computer programming

Longest Prefix Matching Using Bloom Filters Sarang Dharmapurikar Praveen Krishnamurthy David E. Taylor [removed] [removed] [removed] Washington University in Saint Louis 1 Brookings Drive

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2003-07-24 11:26:24
784Random oracle / Oracle machine / Hash function / One-way compression function / Cryptography / Cryptographic hash functions / Merkle–Damgård construction

Indifferentiable Security Analysis of Popular Hash Functions with Prefix-free Padding Donghoon Chang1 , Sangjin Lee1 , Mridul Nandi2 , and Moti Yung3 1 Center for Information Security Technologies(CIST), Korea Universit

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-03-05 01:27:34
785Mathematics / MinHash / Hash function / Locality-sensitive hashing / Jaccard index / Logarithm / Tabulation hashing / Search algorithms / Statistics / Artificial intelligence

Improved Consistent Sampling, Weighted Minhash and L1 Sketching Sergey Ioffe Google Inc., 1600 Amphitheatre Pkwy, Mountain View, CA 94043, [removed] Abstract—We propose a new Consistent Weighted Sampling method

Add to Reading List

Source URL: static.googleusercontent.com

Language: English - Date: 2012-04-01 20:13:23
786Oblivious transfer / Models of computation / Randomness / Random oracle / Oracle machine / Advantage / Optimal asymmetric encryption padding / Secure two-party computation / Random function / Cryptography / Cryptographic protocols / Cryptographic hash functions

Extending Oblivious Transfers Efficiently Yuval Ishai1 , Joe Kilian2 , Kobbi Nissim2? , and Erez Petrank1?? 1 2

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:56
787Information science / Artificial intelligence / Universal hashing / Cuckoo hashing / Hash table / Hash function / Perfect hash function / Linear probing / Coalesced hashing / Hashing / Search algorithms / Information retrieval

§1. Elements of Hashing Lecture XI Page 1

Add to Reading List

Source URL: cs.nyu.edu

Language: English - Date: 2012-11-13 11:24:25
788Internet protocols / Public-key cryptography / Internet standards / Key management / DNS spoofing / Domain Name System Security Extensions / Man-in-the-middle attack / Transport Layer Security / Cryptographic hash function / Cryptography / Internet / Domain name system

SEC[removed]E-MAIL SECURITY 805

Add to Reading List

Source URL: authors.phptr.com

Language: English - Date: 2002-08-15 11:31:28
789Error detection and correction / Hash function / Ruby on Rails / Active record pattern / Password / Computer programming / Software / Search algorithms / Computing

Cheatsheet • FormHelper parsing form data When a form is submitted to a Rails application, the parameters are automatically translated by Rails into the params object which is accessible as a hash structure. „„Key/v

Add to Reading List

Source URL: www.bassanoparquet.com

Language: English - Date: 2009-06-30 12:25:26
790Computational complexity theory / Randomness extractor / Information theory / Finite fields / Leftover hash lemma / Entropy / XTR / Pseudorandom generator / Cryptographic hash function / Cryptography / Applied mathematics / Randomness

Overcoming Weak Expectations Yevgeniy Dodis∗ Yu Yu† December 22, 2012

Add to Reading List

Source URL: cs.nyu.edu

Language: English - Date: 2012-12-22 10:21:59
UPDATE