International audienceThis paper focuses on parallel hash functions based on tree modes of operation for a compression function. We discuss the various forms of optimality that can be obtained when designing such parallel hash functions. The first result is a scheme which optimizes the tree topology in order to decrease at best the running time. Then, without affecting the optimal running time we show that we can slightly change the corresponding tree topology so as to decrease at best the number of required processors as well. Consequently, the resulting scheme optimizes in the first place the running time and in the second place the number of required processors. The present work is of independent interest if we consider the problem of pa...
AbstractA parallel dictionary is implemented on a randomized CRCW PRAM with p processors in such a w...
A perfect hash function for a (multi)set $X$ of $n$ integers is an injective function $h:X\to\{1,\ld...
Recently, cryptanalysts have found collisions on the MD4, MD5, and SHA-0 algorithms; moreover, a met...
We revisit the classical problem of designing optimally efficient cryptographically secure hash func...
Discussions about the choice of a tree hash mode of operation for a standardization have recently be...
Abstract. The sequential computation of hashes at the core of many distributed storage systems and f...
The sequential computation of hashes at the core of many distributed storage systems and found, for ...
The sequential computation of hashes at the core of many distributed storage systems and found, for ...
The sequential computation of hashes at the core of many distributed storage systems and found, for ...
AbstractWe present a binary tree based parallel algorithm for extending the domain of a universal on...
We consider the general case of tree hashing modes that make use of an underlying compression functi...
There is a common problem of operating on hash values of elements of some database. In this paper th...
The challenging problems arising from fast parallel N-body simulations became a driver for high perf...
AbstractWe present a binary tree based parallel algorithm for extending the domain of a universal on...
) Yossi Matias Uzi Vishkin University of Maryland & Tel-Aviv University Abstract We present a n...
AbstractA parallel dictionary is implemented on a randomized CRCW PRAM with p processors in such a w...
A perfect hash function for a (multi)set $X$ of $n$ integers is an injective function $h:X\to\{1,\ld...
Recently, cryptanalysts have found collisions on the MD4, MD5, and SHA-0 algorithms; moreover, a met...
We revisit the classical problem of designing optimally efficient cryptographically secure hash func...
Discussions about the choice of a tree hash mode of operation for a standardization have recently be...
Abstract. The sequential computation of hashes at the core of many distributed storage systems and f...
The sequential computation of hashes at the core of many distributed storage systems and found, for ...
The sequential computation of hashes at the core of many distributed storage systems and found, for ...
The sequential computation of hashes at the core of many distributed storage systems and found, for ...
AbstractWe present a binary tree based parallel algorithm for extending the domain of a universal on...
We consider the general case of tree hashing modes that make use of an underlying compression functi...
There is a common problem of operating on hash values of elements of some database. In this paper th...
The challenging problems arising from fast parallel N-body simulations became a driver for high perf...
AbstractWe present a binary tree based parallel algorithm for extending the domain of a universal on...
) Yossi Matias Uzi Vishkin University of Maryland & Tel-Aviv University Abstract We present a n...
AbstractA parallel dictionary is implemented on a randomized CRCW PRAM with p processors in such a w...
A perfect hash function for a (multi)set $X$ of $n$ integers is an injective function $h:X\to\{1,\ld...
Recently, cryptanalysts have found collisions on the MD4, MD5, and SHA-0 algorithms; moreover, a met...