• MMH

  • Referenced in 16 articles [sw24968]
  • describe a construction of almost universal hash functions suitable for very fast software implementation ... over current software implementations of universal hashing and other message authentication techniques (e.g., MD5-based ... performance needs of cryptographic (and other universal hashing) applications. par The construction is based ... Carter and Wegman for universal hashing using modular multilinear functions that we carefully modify...
  • MCBC

  • Referenced in 7 articles [sw03323]
  • HCBC2 are two known examples of Hash Cipher Block Chaining online ciphers. The first construction ... uses a finite field multiplication based universal hash function, the former needs one less ... MCBC does not need any universal hash function and it needs only one blockcipher...
  • SipHash

  • Referenced in 9 articles [sw09726]
  • simpler than MACs based on universal hashing, and faster on short inputs. Compared to dedicated...
  • POEx

  • Referenced in 3 articles [sw22877]
  • call to a 2n-bit universal hash function per message block. POEx builds upon...
  • SparseCount2

  • Referenced in 1 article [sw41091]
  • number of solutions of (varphi). The hashing-based techniques for approximate counting have emerged ... standard construction of strongly 2-universal hash functions employs dense XORs (i.e., involving half...
  • ApproxMC3

  • Referenced in 1 article [sw41092]
  • number of solutions of (varphi). The hashing-based techniques for approximate counting have emerged ... standard construction of strongly 2-universal hash functions employs dense XORs (i.e., involving half...
  • GraphGrep

  • Referenced in 11 articles [sw18891]
  • GraphGrep: A fast and universal method for querying graphs. GraphGrep is an application-independent method ... variable-length wildcards. Our algorithm uses hash-based fingerprinting to represent the graphs...
  • MaxDomino

  • Referenced in 2 articles [sw01764]
  • transaction. We also propose a hashing scheme to collapse the database to a form that ... connect dataset [Benchmark dataset created by University California, Irvine], our experimental results reveal that MaxDomino...
  • UNF

  • Referenced in 0 articles [sw20446]
  • universal numeric fingerprint (UNF) for an R data object. UNF is a cryptographic hash...
  • net.datastructures

  • Referenced in 2 articles [sw12789]
  • sequences, trees, priority queues, search trees, hash tables; sorting algorithms; graphs, their traversals, and applications ... applications. net.datastructures has been developed at Brown University and at the University of California, Irvine...
  • Coq

  • Referenced in 1880 articles [sw00161]
  • Coq is a formal proof management system. It...
  • GAP

  • Referenced in 3154 articles [sw00320]
  • GAP is a system for computational discrete algebra...
  • Magma

  • Referenced in 3296 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...
  • Maple

  • Referenced in 5363 articles [sw00545]
  • The result of over 30 years of cutting...
  • Mathematica

  • Referenced in 6337 articles [sw00554]
  • Almost any workflow involves computing results, and that...
  • R

  • Referenced in 9810 articles [sw00771]
  • R is a language and environment for statistical...
  • SageMath

  • Referenced in 1970 articles [sw00825]
  • Sage (SageMath) is free, open-source math software...
  • Modula

  • Referenced in 197 articles [sw01224]
  • The Modula programming language is a descendant of...
  • Uppaal2k

  • Referenced in 43 articles [sw01595]
  • Uppaal is an integrated tool environment for modeling...
  • JPEG2000

  • Referenced in 64 articles [sw02062]
  • The JPEG 2000 Suite provides a comprehensive overview...