Many efficient data structures use randomness, allowing them to improve upon deterministic ones. Usually, their efficiency and correctness are analyzed using probabilistic tools under the assumption that the inputs and queries are independent of the internal randomness of the data structure. In this work, we consider data structures in a more robust model, which we call the adversarial model. Roughly speaking, this model allows an adversary to choose inputs and queries adaptively according to previous responses. Specifically, we consider a data structure known as Bloom filter and prove a tight connection between Bloom filters in this model and cryptography. A Bloom filter represents a set $S$ of elements approximately, by using fewer bit...
Classical Bloom filters may be used to elegantly check if an element e belongs to a set S, and, if ...
We investigate the adversarial robustness of streaming algorithms. In this context, an algorithm is ...
Streaming algorithms are typically analyzed in the oblivious setting, where we assume that the input...
Many efficient data structures use randomness, allowing them to improve upon deterministic ones. Usu...
A Bloom filter is a probabilistic hash-based data structure extensively used insoftware products inc...
A Bloom filter is a probabilistic hash-based data structure extensively used insoftware products inc...
We study the security of Probabilistic Data Structures (PDS) for handling Approximate Membership Que...
International audienceA Bloom filter is a probabilistic hash-based data structure extensively used i...
International audienceA Bloom filter is a probabilistic hash-based data structure extensively used i...
A Bloom filter is a simple randomized data structure that answers membership query with no false neg...
A Bloom filter is a simple randomized data structure that answers membership query with no false neg...
We study a fundamental question concerning adversarial noise models in statistical problems where th...
In this paper, we study streaming and online algorithms in the context of randomness in the input. F...
We study streaming algorithms in the white-box adversarial model, where the stream is chosen adaptiv...
Bloom Filters are efficient randomized data structures for membership queries on a set with a certai...
Classical Bloom filters may be used to elegantly check if an element e belongs to a set S, and, if ...
We investigate the adversarial robustness of streaming algorithms. In this context, an algorithm is ...
Streaming algorithms are typically analyzed in the oblivious setting, where we assume that the input...
Many efficient data structures use randomness, allowing them to improve upon deterministic ones. Usu...
A Bloom filter is a probabilistic hash-based data structure extensively used insoftware products inc...
A Bloom filter is a probabilistic hash-based data structure extensively used insoftware products inc...
We study the security of Probabilistic Data Structures (PDS) for handling Approximate Membership Que...
International audienceA Bloom filter is a probabilistic hash-based data structure extensively used i...
International audienceA Bloom filter is a probabilistic hash-based data structure extensively used i...
A Bloom filter is a simple randomized data structure that answers membership query with no false neg...
A Bloom filter is a simple randomized data structure that answers membership query with no false neg...
We study a fundamental question concerning adversarial noise models in statistical problems where th...
In this paper, we study streaming and online algorithms in the context of randomness in the input. F...
We study streaming algorithms in the white-box adversarial model, where the stream is chosen adaptiv...
Bloom Filters are efficient randomized data structures for membership queries on a set with a certai...
Classical Bloom filters may be used to elegantly check if an element e belongs to a set S, and, if ...
We investigate the adversarial robustness of streaming algorithms. In this context, an algorithm is ...
Streaming algorithms are typically analyzed in the oblivious setting, where we assume that the input...