First Page | Document Content | |
---|---|---|
![]() Date: 2001-05-09 22:04:03Artificial intelligence Universal hashing Applied mathematics Hash function Tabulation hashing MMH-Badger MAC Search algorithms Hashing Information retrieval | Add to Reading List |
![]() | (ϵ, δ)-Estimators: How to count very efficiently up to n MSC - CR01 - Randomness in Science Lecture 3 by Nicolas Schabanel Jan 9, 2014DocID: 19u8g - View Document |
![]() | CCCG 2010, Winnipeg MB, August 9–11, 2010 Small Strong Epsilon Nets Pradeesha Ashok∗ Sathish Govindarajan†DocID: 18Y6w - View Document |
![]() | A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3 (updated version) Thomas Fuhr, Henri Gilbert, Jean-René Reinhard, and Marion Videau ANSSI, FranceDocID: 12Imp - View Document |
![]() | Lecture 9, ThursdayChoosing Hash Functions O Mostly black magic…DocID: 11HKy - View Document |
![]() | Galois MAC with forgery probability close to idealDocID: jhOc - View Document |