New constructions of universal hash functions based on function sums
In this paper, we propose a generalization of the SQUARE hash function family to the function sum hash, which is based on functions with low maximal differential over arbitrary Abelian groups. These new variants allow the designer to construct SQUARE-like hash functions on different platforms for ef...
| Main Authors: | Khoo, , K, Heng, , SH |
|---|---|
| Format: | Article |
| Published: |
2006
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2023/ |
Similar Items
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004)
by: Ngo, , DCL, et al.
Published: (2004)
Personalised cryptographic key generation based on FaceHashing
by: TEOH, A
Published: (2004)
by: TEOH, A
Published: (2004)
PalmHashing: a novel approach for cancelable biometrics
by: Tee, Connie, et al.
Published: (2005)
by: Tee, Connie, et al.
Published: (2005)
Parallel Geometric Hashing Algorithm For Protein Tertiary Structure.
by: Jaber, Khalid, et al.
Published: (2007)
by: Jaber, Khalid, et al.
Published: (2007)
PalmHashing: A novel approach for dual-factor authentication
by: Tee, Connie, et al.
Published: (2004)
by: Tee, Connie, et al.
Published: (2004)
Cancellable biometrics and annotations on BioHash
by: TEOH, A, et al.
Published: (2008)
by: TEOH, A, et al.
Published: (2008)
Remarks on BioHash and its mathematical foundation
by: TEOH, A, et al.
Published: (2006)
by: TEOH, A, et al.
Published: (2006)
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Remarks on BioHashing based cancelable biometrics in verification system
by: JIN, A, et al.
Published: (2006)
by: JIN, A, et al.
Published: (2006)
Multiple hashes of single key with passcode for multiple accounts
by: Lee, Kok-wah, et al.
Published: (2007)
by: Lee, Kok-wah, et al.
Published: (2007)
Lexical Functions For Ants Based Semantic Analysis.
by: Schwab, Didier, et al.
Published: (2007)
by: Schwab, Didier, et al.
Published: (2007)
Modelling, Detection And Exploitation Of Lexical Functions For Analysis.
by: Schwab, Didier, et al.
Published: (2007)
by: Schwab, Didier, et al.
Published: (2007)
CSI 502 - FUNCTIONAL PROGRAMMING APRIL 1993
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1993)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1993)
CSI 502 - FUNCTIONAL PROGRAMMING - APR. 1994
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1994)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1994)
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs
by: Teoh, A.B.J., et al.
Published: (2006)
by: Teoh, A.B.J., et al.
Published: (2006)
Finding Best Semantic Relatedness Functions For Schema Matchers
by: Emadzadeh, Ehsan
Published: (2010)
by: Emadzadeh, Ehsan
Published: (2010)
Learning And Optimization Of The Kernel Functions From Insufficiently Labeled Data
by: Abbasnejad, M. Ehsan
Published: (2010)
by: Abbasnejad, M. Ehsan
Published: (2010)
Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network
by: Sallim, Jamaludin
Published: (2017)
by: Sallim, Jamaludin
Published: (2017)
Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network
by: SALLIM, JAMALUDIN
Published: (2017)
by: SALLIM, JAMALUDIN
Published: (2017)
Enhanced Cuckoo Search Algorithm With Metaheuristic Components For Extracting The Maxima Of The Orientation Distribution Function
by: Shehab, Mohammad Mohammad Said
Published: (2018)
by: Shehab, Mohammad Mohammad Said
Published: (2018)
Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and 2N Discretization
by: Wai Kuan, Yip, et al.
Published: (2007)
by: Wai Kuan, Yip, et al.
Published: (2007)
A Multi-objective Evolutionary Algorithm Based On Decomposition For Continuous Optimization Using A Step-function Technique
by: Chuah, How Siang
Published: (2022)
by: Chuah, How Siang
Published: (2022)
Smartal (Student Management Portal): Functional Requirement Analysis To Develop The English Language Diagnosis Module.
by: Rajamanicam, Roshini
Published: (2010)
by: Rajamanicam, Roshini
Published: (2010)
Minimizing the sum of earliness/tardiness in identical parallel machines schedule with incompatible job families: An improved MIP approach
by: OMAR, M, et al.
Published: (2006)
by: OMAR, M, et al.
Published: (2006)
Modulation Transfer Function Compensation
Through A Modified Wiener Filter
For Spatial Image Quality Improvement
by: Wong , Soo Mee
Published: (2010)
by: Wong , Soo Mee
Published: (2010)
Modulation Transfer Function Compensation Through A Modified Wiener Filter For Spatial Image Quality Improvement.
by: Wong, Soo Mee
Published: (2010)
by: Wong, Soo Mee
Published: (2010)
Classification Of P300 Signals In Brain-Computer Interface Using Neural Networks With Adjustable Activation Functions
by: Aslarzanagh, Seyed Aliakbar Mousavi
Published: (2013)
by: Aslarzanagh, Seyed Aliakbar Mousavi
Published: (2013)
A HYBRID GENETIC ALGORITHM FOR OPTICAL ORTHOGONAL CODE CONSTRUCTION
by: Ho, C. K., et al.
Published: (2003)
by: Ho, C. K., et al.
Published: (2003)
Gpu Based Fast Phylogenetic Tree
Construction Algorithm With Reduce
Dataset
by: Ibrahim, Najihah
Published: (2016)
by: Ibrahim, Najihah
Published: (2016)
A hybrid ant colony optimization approach (hACO) for constructing load-balanced clusters
by: Ho, C. K., et al.
Published: (2005)
by: Ho, C. K., et al.
Published: (2005)
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018)
by: Eid, Almazrooie Mishal
Published: (2018)
k-Resilient Identity-Based Encryption in the Standard Model
by: HENG, S.-H.
Published: (2006)
by: HENG, S.-H.
Published: (2006)
MaTRU: A new NTRU-based cryptosystem
by: Coglianese, , M, et al.
Published: (2005)
by: Coglianese, , M, et al.
Published: (2005)
Applicability of feed-forward and recurrent neural networks to Boolean function complexity modeling
by: BEG, A, et al.
Published: (2008)
by: BEG, A, et al.
Published: (2008)
New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Rewind: Cbt-Based Serious Game To Improve Cognitive Emotion Regulations And Anxiety Disorders
by: Heng, Yew Ken
Published: (2023)
by: Heng, Yew Ken
Published: (2023)
On An Improved Parallel Construction Of Suffix Arrays For Low Bandwidth Pc-Cluster.
by: Kok, Jun Lee, et al.
Published: (2003)
by: Kok, Jun Lee, et al.
Published: (2003)
A New Digital Signature Scheme Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
A New Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Parallel Platform For New Secure Stream Ciphers Based On Np-hard Problems
by: Mohammad A. Suwais, Khaled
Published: (2009)
by: Mohammad A. Suwais, Khaled
Published: (2009)
Similar Items
-
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004) -
Personalised cryptographic key generation based on FaceHashing
by: TEOH, A
Published: (2004) -
PalmHashing: a novel approach for cancelable biometrics
by: Tee, Connie, et al.
Published: (2005) -
Parallel Geometric Hashing Algorithm For Protein Tertiary Structure.
by: Jaber, Khalid, et al.
Published: (2007) -
PalmHashing: A novel approach for dual-factor authentication
by: Tee, Connie, et al.
Published: (2004)