Hashing

Results: 1317



#Item
1Cryptography / Block ciphers / Data Encryption Standard / Finite fields / Feistel cipher / ARIA / Advanced Encryption Standard / Differential cryptanalysis / ICE / Interpolation attack / Stream cipher / XTR

MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity Martin Albrecht1 , Lorenzo Grassi3 , Christian Rechberger2,3 , Arnab Roy2 , and Tyge Tiessen2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-01-05 05:07:13
2Information retrieval / Hashing / Information science / Search algorithms / Locality-sensitive hashing / Hash function / Hash table / Cryptographic hash function / Hash list / MinHash / RabinKarp algorithm

Introduction to Locality-Sensitive Hashing Tyler NeylonFormats: html | pdf | kindle pdf] Locality-sensitive hashing (LSH) is a set of techniques that

Add to Reading List

Source URL: tylerneylon.com

Language: English - Date: 2018-09-18 19:56:28
3Computing / Software engineering / Computer programming / Object-oriented programming languages / Abstract data types / Object / Java / Iterator / Scala / Abstraction / Java collections framework / Object-oriented programming

Proceedings: Equality and Hashing for (Almost) Free: Generating Implementations from Abstraction Functions

Add to Reading List

Source URL: rishabhmit.bitbucket.io

Language: English - Date: 2018-06-25 09:59:57
4

Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes Xiaoyang Dong and Xiaoyun Wang Shandong University, Tsinghua University

Add to Reading List

Source URL: www.nuee.nagoya-u.ac.jp

Language: English - Date: 2017-03-06 00:55:10
    5

    1 Hashing for Similarity Search: A Survey Jingdong Wang, Heng Tao Shen, Jingkuan Song, and Jianqiu Ji arXiv:1408.2927v1 [cs.DS] 13 Aug 2014

    Add to Reading List

    Source URL: arxiv.org

    Language: English - Date: 2014-08-13 20:23:00
      6

      Sieving for shortest vectors in lattices using (angular) locality-sensitive hashing Thijs Laarhoven http://www.thijs.com/

      Add to Reading List

      Source URL: thijs.com

      Language: English - Date: 2015-08-18 13:30:19
        7

        Consistent Hashing and Random Trees: Distributed Caching Protocols for Relieving Hot Spots on the World Wide Web David Karger 

        Add to Reading List

        Source URL: www.akamai.com

        Language: English - Date: 2018-05-14 10:04:15
          8

          Double-Bit Quantization for Hashing Weihao Kong and Wu-Jun Li Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science and Engineering, Shanghai Jiao Tong University, China {kongweihao,liw

          Add to Reading List

          Source URL: cs.nju.edu.cn

          Language: English - Date: 2015-12-14 04:04:39
            UPDATE