메뉴 건너뛰기




Volumn , Issue , 2008, Pages 746-755

Why simple hash functions work: Exploiting the entropy in a data stream

Author keywords

[No Author keywords available]

Indexed keywords

BLOOM FILTERING; DATASTREAM (CO); PERFORMANCE GUARANTEES; RANDOM SOURCES; TO MANY;

EID: 49049116151     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (112)

References (35)
  • 2
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • Special issue on cryptography
    • C. H. Bennett, G. Brassard, and J.-M. Robert. Privacy amplification by public discussion. SJAM Journal on Computing, 17(2):210-229, 1988. Special issue on cryptography.
    • (1988) SJAM Journal on Computing , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.-M.3
  • 3
    • 0014814325 scopus 로고
    • Space/Time Trade-offs in Hash Coding with Allowable Errors
    • B. H. Bloom. Space/Time Trade-offs in Hash Coding with Allowable Errors. Communications of the ACM, 13(7):422-426, 1970.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 4
    • 0001215301 scopus 로고
    • Coloring random and semirandom k-colorable graphs
    • A. Blum and J. Spencer. Coloring random and semirandom k-colorable graphs. Journal of Algorithms, I9(2):204-234, 1995.
    • (1995) Journal of Algorithms , vol.I9 , Issue.2 , pp. 204-234
    • Blum, A.1    Spencer, J.2
  • 6
    • 70450232823 scopus 로고    scopus 로고
    • Network Applications of Bloom Filters: A Survey
    • A. Broder and M. Mitzenmacher. Network Applications of Bloom Filters: A Survey. Internet Mathematics, 1(4):485-509, 2005.
    • (2005) Internet Mathematics , vol.1 , Issue.4 , pp. 485-509
    • Broder, A.1    Mitzenmacher, M.2
  • 8
    • 0023985259 scopus 로고
    • Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity
    • Apr
    • B. Chor and O. Goldreich. Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity. SIAM J. Comput., 17(2):230-261, Apr. 1988.
    • (1988) SIAM J. Comput , vol.17 , Issue.2 , pp. 230-261
    • Chor, B.1    Goldreich, O.2
  • 11
    • 35048839833 scopus 로고    scopus 로고
    • Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes
    • M. K. Franklin, editor, CRYPTO, of, Springer
    • Y. Dodis, R. Gennaro, J. Håstad, H. Krawczyk, and T. Rabin. Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. In M. K. Franklin, editor, CRYPTO, volume 3152 of Lecture Notes in Computer Science, pages 494-510. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3152 , pp. 494-510
    • Dodis, Y.1    Gennaro, R.2    Håstad, J.3    Krawczyk, H.4    Rabin, T.5
  • 16
    • 0003294665 scopus 로고    scopus 로고
    • The Art of Computer Programming
    • Addison Wesley Longman Publishing Co, Inc. Redwood City, CA, USA
    • D. Knuth. 'The Art of Computer Programming, Volume 3: Sorting and Searching. Addison Wesley Longman Publishing Co., Inc. Redwood City, CA, USA, 1998.
    • (1998) Sorting and Searching , vol.3
    • Knuth, D.1
  • 18
    • 0033075850 scopus 로고    scopus 로고
    • Extracting Randomness: A Survey and New Constructions
    • N. Nisan and A. Ta-Shma. Extracting Randomness: A Survey and New Constructions. Journal of Computer and System Sciences, 58(1):148-173, 1999.
    • (1999) Journal of Computer and System Sciences , vol.58 , Issue.1 , pp. 148-173
    • Nisan, N.1    Ta-Shma, A.2
  • 19
    • 0030086632 scopus 로고    scopus 로고
    • Randomness is Linear in Space
    • Feb
    • N. Nisan and D. Zuckerman. Randomness is Linear in Space. J. Comput. Syst. Sci., 52(1):43-52, Feb. 1996.
    • (1996) J. Comput. Syst. Sci , vol.52 , Issue.1 , pp. 43-52
    • Nisan, N.1    Zuckerman, D.2
  • 24
    • 0024752323 scopus 로고
    • Practical performance of Bloom filters and parallel free-text searching
    • M. V. Ramakrishna. Practical performance of Bloom filters and parallel free-text searching. Communications of the ACM, 32(10):1237-1239, 1989.
    • (1989) Communications of the ACM , vol.32 , Issue.10 , pp. 1237-1239
    • Ramakrishna, M.V.1
  • 25
    • 0031366315 scopus 로고    scopus 로고
    • Efficient Hardware Hashing Functions for High Performance Computers
    • M. V. Ramakrishna, E. Fu, and E. Bahcekapili. Efficient Hardware Hashing Functions for High Performance Computers. IEEE Trans. Comput., 46(12):1378-1381, 1997.
    • (1997) IEEE Trans. Comput , vol.46 , Issue.12 , pp. 1378-1381
    • Ramakrishna, M.V.1    Fu, E.2    Bahcekapili, E.3
  • 26
    • 0021469810 scopus 로고
    • Generating Quasi-random Sequences from Semi-random Sources
    • Aug
    • M. Santha and U. V. Vazirani. Generating Quasi-random Sequences from Semi-random Sources. J. Comput. Syst. Sci., 33(1):75-87, Aug. 1986.
    • (1986) J. Comput. Syst. Sci , vol.33 , Issue.1 , pp. 75-87
    • Santha, M.1    Vazirani, U.V.2
  • 27
    • 0024984431 scopus 로고
    • The Analysis of Closed Hashing under Limited Randomness (Extended Abstract)
    • ACM
    • J. P. Schmidt and A. Siegel. The Analysis of Closed Hashing under Limited Randomness (Extended Abstract). In STOC, pages 224-234. ACM, 1990.
    • (1990) STOC , pp. 224-234
    • Schmidt, J.P.1    Siegel, A.2
  • 29
    • 3142708934 scopus 로고    scopus 로고
    • On universal classes of extremely random constant-time hash functions
    • 505-543 electronic
    • A. Siegel. On universal classes of extremely random constant-time hash functions. SI AM Journal on Computing, 33(3):505-543 (electronic), 2004.
    • (2004) SI AM Journal on Computing , vol.33 , Issue.3
    • Siegel, A.1
  • 30
    • 4243066295 scopus 로고    scopus 로고
    • Smoothed analysis of algorithms: Why the simplex algorithm usually takes polynomial time
    • 385-463 electronic
    • D. A. Spielman and S.-H. Teng. Smoothed analysis of algorithms: why the simplex algorithm usually takes polynomial time. Journal of the ACM, 51(3):385-463 (electronic), 2004.
    • (2004) Journal of the ACM , vol.51 , Issue.3
    • Spielman, D.A.1    Teng, S.-H.2
  • 32
    • 33244463908 scopus 로고    scopus 로고
    • How asymmetry helps load balancing
    • B. Vöcking. How asymmetry helps load balancing. Journal of the ACM, 50(4):568-589, 2003.
    • (2003) Journal of the ACM , vol.50 , Issue.4 , pp. 568-589
    • Vöcking, B.1
  • 33
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • Special issue dedicated to Michael Machtey
    • M. N. Wegman and J. L. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22(3):265-279, 1981. Special issue dedicated to Michael Machtey.
    • (1981) Journal of Computer and System Sciences , vol.22 , Issue.3 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2
  • 35
    • 0001023343 scopus 로고    scopus 로고
    • Simulating BPP Using a General Weak Random Source
    • Oct./Nov
    • D. Zuckerman. Simulating BPP Using a General Weak Random Source. Algorithmica, 16(4/5):367-391, Oct./Nov. 1996.
    • (1996) Algorithmica , vol.16 , Issue.4-5 , pp. 367-391
    • Zuckerman, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.