Sciweavers

648 search results - page 29 / 130
» Authenticated hash tables
Sort
View
BIOID
2008
134views Biometrics» more  BIOID 2008»
13 years 10 months ago
Advanced Studies on Reproducibility of Biometric Hashes
The determination of hashes based on biometric data is a recent topic in biometrics as it allows to handle biometric templates in a privacy manner. Applications could be the genera...
Tobias Scheidat, Claus Vielhauer, Jana Dittmann
ANCS
2009
ACM
13 years 6 months ago
Divide and discriminate: algorithm for deterministic and fast hash lookups
Exact and approximate membership lookups are among the most widely used primitives in a number of network applications. Hash tables are commonly used to implement these primitive ...
Domenico Ficara, Stefano Giordano, Sailesh Kumar, ...
ALGORITHMICA
2008
95views more  ALGORITHMICA 2008»
13 years 8 months ago
Optimality in External Memory Hashing
Hash tables on external memory are commonly used for indexing in database management systems. In this paper we present an algorithm that, in an asymptotic sense, achieves the best...
Morten Skaarup Jensen, Rasmus Pagh
INFOCOM
2008
IEEE
14 years 3 months ago
The Power of One Move: Hashing Schemes for Hardware
—In a standard multiple choice hashing scheme, each item is stored in one of d ≥ 2 hash table buckets. The availability of choice in where items are stored improves space utili...
Adam Kirsch, Michael Mitzenmacher
CARDIS
1998
Springer
110views Hardware» more  CARDIS 1998»
14 years 1 months ago
Reducing the Collision Probability of Alleged Comp128
Wagner, Goldberg and Briceno have recently published an attack [2] on what they believe to be Comp128, the GSM A3A8 authentication hash function [1]. Provided that the attacker has...
Helena Handschuh, Pascal Paillier