Articles with "hash functions" as a keyword



Photo from wikipedia

A fast online spherical hashing method based on data sampling for large scale image retrieval

Sign Up to like & get
recommendations!
Published in 2019 at "Neurocomputing"

DOI: 10.1016/j.neucom.2019.06.053

Abstract: Abstract Hashing methods are used to perform the approximate nearest neighbor search due to the low storage for binary codes and the fast computation of Hamming distance. However, in most of the hashing methods, the… read more here.

Keywords: fast online; method based; hash functions; data sample ... See more keywords
Photo by kellysikkema from unsplash

A Split Bloom Filter for Better Performance

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of Applied Security Research"

DOI: 10.1080/19361610.2019.1613090

Abstract: Abstract Bloom filters (BF) are widely used in (wireless) network security protocols, searchable encryptions, and many other places. For performance and implementation issues, these applications prefer to use as few hash functions and as small… read more here.

Keywords: bloom filter; hash functions; bloom; split bloom ... See more keywords
Photo from wikipedia

Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3195572

Abstract: The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is… read more here.

Keywords: design trends; hash; cryptographic hash; hash functions ... See more keywords
Photo by alexbemore from unsplash

Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3215778

Abstract: In modern cryptography, hash functions are considered as one of the key components for secure communication. They play a vital role in a wide range of applications such as ensuring the authentication and integrity of… read more here.

Keywords: based applications; hash; hash functions; hash based ... See more keywords
Photo by intenzafitness from unsplash

Fast Counterfeit RFID Tags Detection With Slot Constraints

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3269571

Abstract: RFID tags are prone to counterfeit attacks in supply chain scenarios. The attacker often uses counterfeit tags to replace stolen tags to avoid being detected by the inventory process. To defend against such attacks, existing… read more here.

Keywords: rfid tags; slot; fast counterfeit; detection ... See more keywords
Photo by ryoji__iwata from unsplash

Optimization of Tree Modes for Parallel Hash Functions: A Case Study

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2017.2693185

Abstract: This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based… read more here.

Keywords: parallel hash; tree modes; hash functions; topology ... See more keywords
Photo by campaign_creators from unsplash

An adaptive image steganography algorithm based on the use of non-cryptographic hash functions for data extraction

Sign Up to like & get
recommendations!
Published in 2023 at "Computer Optics"

DOI: 10.18287/2412-6179-co-1215

Abstract: An adaptive steganography algorithm for data hiding in full-color images based on iterative introduction of minor distortions into blocks of container images and the use of high-speed non-cryptographic hash functions for data extraction is considered.… read more here.

Keywords: functions data; steganography; steganography algorithm; cryptographic hash ... See more keywords