The idea of a universal class of hash functions is due to Carter and Wegman. The goal is to define a collection of hash functions in such a way that a random choice of a function in the class yields a low probability that any two distinct inputs will collide. In this paper, we present some characterizations of universal classes of hash functions in terms of combinatorial designs such as resolvable balanced incomplete block designs and orthogonal arrays. The two classes of hash functions that we study are called optimally universal and strongly universal. We show that optimally universal classes of hash functions are equivalent to resolvable balanced incomplete block designs and strongly universal classes are equivalent to orthogonal arrays....
.We present three explicit constructions of hash functions, which exhibit a trade-off between the si...
Abstract. Let d ≥ 1 be an integer and R1 be a finite ring whose el-ements are called block. A d-bloc...
Universal hashing found a lot of applications in computer science. In cryptography the most importan...
AbstractWe introduce a method for constructing optimally universal hash families and equivalently RB...
AbstractThis paper gives an input independent average linear time algorithm for storage and retrieva...
The aim of this tutorial article is to provide an introduction to methods based on universal hashing...
In the talk, we shall discuss quality measures for hash functions used in data structures and algori...
In the talk, we shall discuss quality measures for hash functions used in data structures and algori...
In this paper we use linear algebraic methods to analyze the performance of several classes of hash ...
Universal hashing, discovered by Carter and Wegman in 1979, has many important applications in compu...
In the talk, we shall discuss quality measures for hash functions used in data structures and algori...
A concept of complexity of hashing is introduced and studied with special attention to the lower bou...
Many algorithms and data structures employing hashing have been analyzed under the uniform hashing a...
Universal hashing found a lot of applications in computer science. In cryptography the most importan...
Consider the set H of all linear (or affine) transformations between two vector spaces over a finite...
.We present three explicit constructions of hash functions, which exhibit a trade-off between the si...
Abstract. Let d ≥ 1 be an integer and R1 be a finite ring whose el-ements are called block. A d-bloc...
Universal hashing found a lot of applications in computer science. In cryptography the most importan...
AbstractWe introduce a method for constructing optimally universal hash families and equivalently RB...
AbstractThis paper gives an input independent average linear time algorithm for storage and retrieva...
The aim of this tutorial article is to provide an introduction to methods based on universal hashing...
In the talk, we shall discuss quality measures for hash functions used in data structures and algori...
In the talk, we shall discuss quality measures for hash functions used in data structures and algori...
In this paper we use linear algebraic methods to analyze the performance of several classes of hash ...
Universal hashing, discovered by Carter and Wegman in 1979, has many important applications in compu...
In the talk, we shall discuss quality measures for hash functions used in data structures and algori...
A concept of complexity of hashing is introduced and studied with special attention to the lower bou...
Many algorithms and data structures employing hashing have been analyzed under the uniform hashing a...
Universal hashing found a lot of applications in computer science. In cryptography the most importan...
Consider the set H of all linear (or affine) transformations between two vector spaces over a finite...
.We present three explicit constructions of hash functions, which exhibit a trade-off between the si...
Abstract. Let d ≥ 1 be an integer and R1 be a finite ring whose el-ements are called block. A d-bloc...
Universal hashing found a lot of applications in computer science. In cryptography the most importan...