Universal hashing

Results: 119



#Item
61Information science / Artificial intelligence / Tabulation hashing / Universal hashing / Linear probing / Hash function / K-independent hashing / Hash table / Cryptographic hash function / Hashing / Search algorithms / Information retrieval

out/LINPB-rand.icore7.Time.sorted.eps

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2012-09-11 00:39:34
62Information science / Artificial intelligence / Hash table / Hash function / Linear probing / Cuckoo hashing / Universal hashing / Quadratic probing / Dynamic perfect hashing / Hashing / Search algorithms / Information retrieval

Strongly History-Independent Hashing with Applications Guy E. Blelloch ∗ Computer Science Department Carnegie Mellon University Daniel Golovin †

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2011-09-21 01:15:40
63Universal hashing / Hash function / Information retrieval / Artificial intelligence / Applied mathematics / Search algorithms / Hashing / Computational complexity theory

Appendix for Tabulation Based 4-Universal Hashing with Applications to Second Moment Estimation Mikkel Thorup

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2004-11-12 12:54:19
64Information retrieval / Information science / Hash function / Hash table / Universal hashing / Cryptographic hash function / Trie / Tabulation hashing / Cuckoo hashing / Hashing / Search algorithms / Artificial intelligence

Reverse Hashing for High-speed Network Monitoring: Algorithms, Evaluation, and Applications Robert Schweller, Zhichun Li, Yan Chen, Yan Gao, Ashish Gupta, Yin Zhang†, Peter Dinda, Ming-Yang Kao, Gokhan Memik

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2006-01-17 18:02:44
65Mathematics / Information retrieval / Analysis of algorithms / Computational complexity theory / Asymptotic analysis / Hash table / Hash function / Heap / Universal hashing / Search algorithms / Hashing / Theoretical computer science

Introduction to Algorithms: 6.006 Massachusetts Institute of Technology Professors Srini Devadas and Erik Demaine March 7, 2008 Handout 6

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2008-03-11 14:32:14
66Cryptography / Information retrieval / Artificial intelligence / Applied mathematics / Block cipher / Universal hashing / Hash function / Hashing / Search algorithms / Cryptographic hash functions

Improving Upon the TET Mode of Operation Palash Sarkar Applied Statistics Unit Indian Statistical Institute 203, B.T. Road, Kolkata India[removed].

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-14 08:08:11
67Cryptography / Cryptographic hash functions / Finite fields / Hashing / Polynomials / Cyclic redundancy check / Polynomial code / Universal hashing / Polynomial / Mathematics / Error detection and correction / Algebra

1 Cryptographically Secure CRC for Lightweight Message Authentication Elena Dubrova∗ , Mats N¨aslund† , G¨oran Selander† , Fredrik Lindqvist† ∗ Royal

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-15 04:13:19
68FIPS 140-2 / FIPS 140 / USB flash drive / Cryptographic Module Validation Program / HMAC / Kingston Technology / Password / Universal Serial Bus / Cryptographic hash function / Cryptography / Cryptography standards / Hashing

Microsoft Word - 1g - Kingston DT4000 G2 FIPS[removed]Level 3 Security Policy v1.8.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-05 14:47:56
69Cryptographic hash functions / Computer programming / Information retrieval / Computational complexity theory / Universal hashing / Hash function / Lookup table / Hashing / Search algorithms / Computing

Low-Density Parity Constraints for Hashing-Based Discrete Integration

Add to Reading List

Source URL: jmlr.org

Language: English - Date: 2014-02-16 19:30:21
70Cryptography / Collision resistance / Hash function / Hash list / SHA-2 / Collision / Universal one-way hash function / SHA-1 / Provably secure cryptographic hash function / Cryptographic hash functions / Error detection and correction / Hashing

Classification of Hash Functions Suitable for Real-life Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:53:32
UPDATE