Linear hashing is awesome
MBT Knudsen - 2016 IEEE 57th Annual Symposium on …, 2016 - ieeexplore.ieee.org
… exist linear hash functions meeting the bounds in Result (ii). These linear hash functions can
easily be altered to be affine hash … of heights to linear hash functions. Given elements x, y Z¦ …
easily be altered to be affine hash … of heights to linear hash functions. Given elements x, y Z¦ …
Linear Hashing is Awesome
M Bæk Tejs Knudsen - arXiv e-prints, 2017 - ui.adsabs.harvard.edu
We consider the hash function $ h (x)=((ax+ b)\bmod p)\bmod n $ where $ a, b $ are chosen
uniformly at random from $\{0, 1,\ldots, p-1\} $. We prove that when we use $ h (x) $ in …
uniformly at random from $\{0, 1,\ldots, p-1\} $. We prove that when we use $ h (x) $ in …
[BOOK][B] Hashing Based Similarity Search over Massive Datasets
J Li - 2018 - search.proquest.com
… Thirdly, we presented GQR, a general querying framework to unleash the power of learning
to hash algorithms (L2H). L2H learns data dependent hash functions, and adopts hamming …
to hash algorithms (L2H). L2H learns data dependent hash functions, and adopts hamming …
Universal hashing via integer arithmetic without primes, revisited
M Dietzfelbinger - Adventures Between Lower Bounds and Higher …, 2018 - Springer
… We give a construction that uses just a linear hash function from \(\mathcal {H}^{\text {lin}}_{u…
so that now cuckoo hashing can be run with the linear classes from the present paper alone. …
so that now cuckoo hashing can be run with the linear classes from the present paper alone. …
On Efficient and Secure Compression Functions for Arithmetization-Oriented Hashing
E Andreeva, R Bhattacharyya, A Roy… - 2024 IEEE 37th …, 2024 - computer.org
… We show that thereare natural classes of the linear transformations involvedin the
compression for which both modes are collisionresistant up to(q2+q)/(pl−q)queries to the …
compression for which both modes are collisionresistant up to(q2+q)/(pl−q)queries to the …
Neighborhood discriminant hashing for large-scale image retrieval
… to the linear hashing, a non-linear semi-supervised hashing method is proposed to capture
the underlying relationship among data points in [39]. A semi-supervised hashing method via …
the underlying relationship among data points in [39]. A semi-supervised hashing method via …
A simple hash-based early exiting approach for language understanding and generation
… MI Hash Further, we also consider a taskspecific hash function that is based on the mutual
information (MI) between each token and the corresponding label, which, as an instance of …
information (MI) between each token and the corresponding label, which, as an instance of …
Hashing, pooling and coding: towards optimal embedding in linguistic steganography
A Wilson - 2016 - ora.ox.ac.uk
… Unlike many other security settings, we do not require properties of cryptographic hash …
length of the hash values we will be using. All we require is that the hash function assigns values …
length of the hash values we will be using. All we require is that the hash function assigns values …
On Efficient and Secure Compression Modes for Arithmetization-Oriented Hashing
… In this work, we first adapt notions related to classical hash functions and their security
notions to the AO syntax, and inspired by the classical PGV modes, we propose AO PGV-LC and …
notions to the AO syntax, and inspired by the classical PGV modes, we propose AO PGV-LC and …
Redesigned and reinforced low-power data encryption standard using hash codes for high-speed and high-secure applications
T Dharbhashayanam, K Manjunatha Chari… - … in Electronics and …, 2018 - Springer
Data Encryption Standard was the first block cipher which was widely used for 25 years. In
this paper, we propose to build a new and strong 128-bit block cipher based on DES which …
this paper, we propose to build a new and strong 128-bit block cipher based on DES which …