Universal hashing

Results: 119



#Item
21Hashing / Search algorithms / Schnorr signature / Digital signature / Random oracle / One-way function / Universal hashing / RSA / Hash function / Cryptography / Public-key cryptography / Cryptographic hash functions

Proceedings of Selected Areas in Cryptography ’98 (August 17–18, 1998, Kingston, Ontario, Canada) S. Tavares and H. Meijer Eds. Springer-Verlag, LNCS 1556, pages 72–80. Computational Alternatives to Random Number G

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2002-06-27 15:00:00
22Applied mathematics / Randomized algorithm / Support / Variance / Random variable / Universal hashing / Euclidean algorithm / Probability theory / Theoretical computer science / Statistics

 Exercise 1 (Missing element & distinct elements). Assume we are reading a stream of n distinct integers in {1, . . . , n + 1}. I Question 1.1) Assume first that all of the elements in the stream are indeed distinct ele

Add to Reading List

Source URL: www.liafa.univ-paris-diderot.fr

Language: English - Date: 2015-01-20 10:03:20
23Applied mathematics / Hashing / Randomized algorithm / Method of conditional probabilities / Universal hashing / Chernoff bound / Tabulation hashing / Random walk / Algorithm / Search algorithms / Mathematics / Theoretical computer science

Notes on Randomized Algorithms CS: Fall 2014 James Aspnes:04

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2014-12-17 20:04:41
24Applied mathematics / Hashing / Randomized algorithm / Method of conditional probabilities / Universal hashing / Chernoff bound / Tabulation hashing / Random walk / Algorithm / Search algorithms / Mathematics / Theoretical computer science

Notes on Randomized Algorithms CS: Fall 2014 James Aspnes:04

Add to Reading List

Source URL: cs.yale.edu

Language: English - Date: 2014-12-17 20:04:41
25Linear algebra / Bayesian inference / Polynomials / Factorization of polynomials over a finite field and irreducibility tests / Universal hashing / Statistics / Statistical theory / Mathematics

Microsoft Word - Major Checksheet 2015.doc

Add to Reading List

Source URL: www.stat.colostate.edu

Language: English - Date: 2015-04-27 13:08:25
26Information retrieval / Information science / Universal hashing / Hash function / Hash table / Cryptographic hash function / Perfect hash function / Tabulation hashing / SUHA / Hashing / Search algorithms / Artificial intelligence

Algorithms Lecture 12: Hash Tables [Fa’13] Insanity is repeating the same mistakes and expecting different results. — Narcotics Anonymous (1981)

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-12-28 09:02:37
27Information science / Artificial intelligence / Hash function / Perfect hash function / Hash table / Cryptographic hash function / Trie / Universal hashing / Tabulation hashing / Search algorithms / Hashing / Information retrieval

COMPUTNVG PRACTICES Using only a few simple and commonplace instructions, this algorithm efficiently maps variable-length text strings on to small integers.

Add to Reading List

Source URL: epaperpress.com

Language: English - Date: 2011-12-28 10:41:56
28Information science / Artificial intelligence / Tabulation hashing / Hash function / Linear probing / Cuckoo hashing / Cryptographic hash function / Hash list / Universal hashing / Hashing / Search algorithms / Information retrieval

May 2013 MADALGO seminar by Mikkel Thorup, University of Copenhagen The Power of Tabulation Hashing Abstract: Abstract Randomized algorithms are often enjoyed for their simplicity, but the hash functions used to yield

Add to Reading List

Source URL: old-madalgo.au.dk

Language: English - Date: 2013-05-10 08:51:10
29Mathematics / Theoretical computer science / Pseudoforest / Cuckoo hashing / Universal hashing / Bipartite graph / Double hashing / Hash function / Graph / Graph theory / Search algorithms / Hashing

A Precise Analysis of Cuckoo Hashing MICHAEL DRMOTA and REINHARD KUTZELNIGG Technische Universit¨at Wien Cuckoo hashing was introduced by Pagh and Rodler inIts main feature is that it provides constant worst case

Add to Reading List

Source URL: www.dmg.tuwien.ac.at

Language: English - Date: 2009-03-12 07:46:10
30Applied mathematics / Hashing / Suffix tree / Hash function / Hash table / Vertex cover / Bloom filter / Universal hashing / Time complexity / Theoretical computer science / Search algorithms / Computational complexity theory

Guide to Examinable Material COMS31900 – Advanced AlgorithmsDecember 2013 Overview This guide is organised topic by topic in the same order that the course was taught. References into the lectures are giv

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 09:18:17
UPDATE