Hashing

Results: 1317



#Item
21Hashing with Graphs  Wei Liu  Department of Electrical Engineering, Columbia University, New York, NY 10027, USA Jun Wang

Hashing with Graphs Wei Liu Department of Electrical Engineering, Columbia University, New York, NY 10027, USA Jun Wang

Add to Reading List

Source URL: www.ee.columbia.edu

Language: English - Date: 2011-05-10 17:37:15
    22STRICT MEMORY HARD HASHING FUNCTIONS (PRELIMINARY V0.3, SERGIO DEMIAN LERNER Abstract. We introduce the concept of strict memory hard functions. Strict memory hard functions are an extension of memory hard func

    STRICT MEMORY HARD HASHING FUNCTIONS (PRELIMINARY V0.3, SERGIO DEMIAN LERNER Abstract. We introduce the concept of strict memory hard functions. Strict memory hard functions are an extension of memory hard func

    Add to Reading List

    Source URL: www.hashcash.org

    Language: English - Date: 2014-02-01 12:00:10
      23Column Sampling based Discrete Supervised Hashing Wang-Cheng Kang, Wu-Jun Li and Zhi-Hua Zhou National Key Laboratory for Novel Software Technology Collaborative Innovation Center of Novel Software Technology and Industr

      Column Sampling based Discrete Supervised Hashing Wang-Cheng Kang, Wu-Jun Li and Zhi-Hua Zhou National Key Laboratory for Novel Software Technology Collaborative Innovation Center of Novel Software Technology and Industr

      Add to Reading List

      Source URL: cs.nju.edu.cn

      Language: English - Date: 2016-01-18 09:12:28
        24MemC3: Compact and Concurrent MemCache with Dumber Caching and Smarter Hashing

        MemC3: Compact and Concurrent MemCache with Dumber Caching and Smarter Hashing

        Add to Reading List

        Source URL: www.usenix.org

        Language: English
          25Memory-hard functions and tradeoff cryptanalysis with applications to password hashing, cryptocurrencies, and white-box cryptography

          Memory-hard functions and tradeoff cryptanalysis with applications to password hashing, cryptocurrencies, and white-box cryptography

          Add to Reading List

          Source URL: www.cryptolux.org

          Language: English - Date: 2014-09-01 07:09:04
            26Provably Secure FFT Hashing Vadim Lyubashevsky∗ Daniele Micciancio†  Chris Peikert‡

            Provably Secure FFT Hashing Vadim Lyubashevsky∗ Daniele Micciancio† Chris Peikert‡

            Add to Reading List

            Source URL: www.eecs.harvard.edu

            Language: English - Date: 2006-07-28 20:13:38
              27Deep Hashing: A Joint Approach for Image Signature Learning

              Deep Hashing: A Joint Approach for Image Signature Learning

              Add to Reading List

              Source URL: www.research.att.com

              - Date: 2018-03-05 02:52:08
                28A Family of Perfect Hashing Methods Bohdan S. Majewski∗ Nicholas C. Wormald†  George Havas‡

                A Family of Perfect Hashing Methods Bohdan S. Majewski∗ Nicholas C. Wormald† George Havas‡

                Add to Reading List

                Source URL: staff.itee.uq.edu.au

                - Date: 2001-07-06 01:28:51