Polynomial hash functions are well studied and widely used in various applications. They have gained popularity because of certain performances they exhibit. It has been shown that even linear hash functions are expected to have such performances. However, quite often we would like the hash functions to be reliable, meaning that they perform well with high probability; for some certain important properties even higher degree polynomials were not known to be reliable. We show that for certain important properties linear hash functions are not reliable. We give indication that quadratic hash functions might not be reliable. On the positive side, we prove that cubic hash functions are reliable. In a more general setting, we show that higher de...
Cryptographic hash functions are an essential building block for security applications. Until 2005, ...
This paper gives an i, put independe, t average linear time algorithm for storage and retrieval on ...
.We present three explicit constructions of hash functions, which exhibit a trade-off between the si...
In the talk, we shall discuss quality measures for hash functions used in data structures and algori...
In this paper we use linear algebraic methods to analyze the performance of several classes of hash ...
Random hashing can provide guarantees regarding the performance of data structures such as hash ta...
In the talk, we shall discuss quality measures for hash functions used in data structures and algori...
At EUROCRYPT 2004, Bellare and Kohno presented the concept of a regular hash function. For a hash fu...
AbstractThis paper gives an input independent average linear time algorithm for storage and retrieva...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
At Eurocrypt 2004, Bellare and Kohno presented the concept of a regular hash function. For a hash fu...
A perfect hash function for a subset X of f0; 1; \Delta \Delta \Delta ; n \Gamma 1g is an injection...
Abstract. At EUROCRYPT 2004, Bellare and Kohno presented the concept of a regular hash function. For...
AbstractIn this paper we exhibit several new classes of hash functions with certain desirable proper...
International audienceIn this paper, we investigate the security of a hash function based on the eva...
Cryptographic hash functions are an essential building block for security applications. Until 2005, ...
This paper gives an i, put independe, t average linear time algorithm for storage and retrieval on ...
.We present three explicit constructions of hash functions, which exhibit a trade-off between the si...
In the talk, we shall discuss quality measures for hash functions used in data structures and algori...
In this paper we use linear algebraic methods to analyze the performance of several classes of hash ...
Random hashing can provide guarantees regarding the performance of data structures such as hash ta...
In the talk, we shall discuss quality measures for hash functions used in data structures and algori...
At EUROCRYPT 2004, Bellare and Kohno presented the concept of a regular hash function. For a hash fu...
AbstractThis paper gives an input independent average linear time algorithm for storage and retrieva...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
At Eurocrypt 2004, Bellare and Kohno presented the concept of a regular hash function. For a hash fu...
A perfect hash function for a subset X of f0; 1; \Delta \Delta \Delta ; n \Gamma 1g is an injection...
Abstract. At EUROCRYPT 2004, Bellare and Kohno presented the concept of a regular hash function. For...
AbstractIn this paper we exhibit several new classes of hash functions with certain desirable proper...
International audienceIn this paper, we investigate the security of a hash function based on the eva...
Cryptographic hash functions are an essential building block for security applications. Until 2005, ...
This paper gives an i, put independe, t average linear time algorithm for storage and retrieval on ...
.We present three explicit constructions of hash functions, which exhibit a trade-off between the si...