Linear hashing is awesome

MBT Knudsen - 2016 IEEE 57th Annual Symposium on …, 2016 - ieeexplore.ieee.org
… exist linear hash functions meeting the bounds in Result (ii). These linear hash functions can
easily be altered to be affine hash … of heights to linear hash functions. Given elements x, y Z¦ …

Linear Hashing is Awesome

M Bæk Tejs Knudsen - arXiv e-prints, 2017 - ui.adsabs.harvard.edu
We consider the hash function $ h (x)=((ax+ b)\bmod p)\bmod n $ where $ a, b $ are chosen
uniformly at random from $\{0, 1,\ldots, p-1\} $. We prove that when we use $ h (x) $ in …

[BOOK][B] Hashing Based Similarity Search over Massive Datasets

J Li - 2018 - search.proquest.com
… Thirdly, we presented GQR, a general querying framework to unleash the power of learning
to hash algorithms (L2H). L2H learns data dependent hash functions, and adopts hamming …

Universal hashing via integer arithmetic without primes, revisited

M Dietzfelbinger - Adventures Between Lower Bounds and Higher …, 2018 - Springer
… We give a construction that uses just a linear hash function from \(\mathcal {H}^{\text {lin}}_{u…
so that now cuckoo hashing can be run with the linear classes from the present paper alone. …

On Efficient and Secure Compression Functions for Arithmetization-Oriented Hashing

E Andreeva, R Bhattacharyya, A Roy… - 2024 IEEE 37th …, 2024 - computer.org
… We show that thereare natural classes of the linear transformations involvedin the
compression for which both modes are collisionresistant up to(q2+q)/(pl−q)queries to the …

Neighborhood discriminant hashing for large-scale image retrieval

J Tang, Z Li, M Wang, R Zhao - IEEE Transactions on Image …, 2015 - ieeexplore.ieee.org
… to the linear hashing, a non-linear semi-supervised hashing method is proposed to capture
the underlying relationship among data points in [39]. A semi-supervised hashing method via …

A simple hash-based early exiting approach for language understanding and generation

T Sun, X Liu, W Zhu, Z Geng, L Wu, Y He, Y Ni… - arXiv preprint arXiv …, 2022 - arxiv.org
… MI Hash Further, we also consider a taskspecific hash function that is based on the mutual
information (MI) between each token and the corresponding label, which, as an instance of …

Hashing, pooling and coding: towards optimal embedding in linguistic steganography

A Wilson - 2016 - ora.ox.ac.uk
… Unlike many other security settings, we do not require properties of cryptographic hash
length of the hash values we will be using. All we require is that the hash function assigns values …

On Efficient and Secure Compression Modes for Arithmetization-Oriented Hashing

E Andreeva, R Bhattacharyya, A Roy… - Cryptology ePrint …, 2024 - eprint.iacr.org
… In this work, we first adapt notions related to classical hash functions and their security
notions to the AO syntax, and inspired by the classical PGV modes, we propose AO PGV-LC and …

Redesigned and reinforced low-power data encryption standard using hash codes for high-speed and high-secure applications

T Dharbhashayanam, K Manjunatha Chari… - … in Electronics and …, 2018 - Springer
Data Encryption Standard was the first block cipher which was widely used for 25 years. In
this paper, we propose to build a new and strong 128-bit block cipher based on DES which …