๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Bucket Hashing and Its Application to Fast Message Authentication

โœ Scribed by Phillip Rogaway


Publisher
Springer
Year
1999
Tongue
English
Weight
333 KB
Volume
12
Category
Article
ISSN
0933-2790

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


The Diagonal Poisson Transform and its a
โœ Patricio V. Poblete; Alfredo Viola; J. Ian Munro ๐Ÿ“‚ Article ๐Ÿ“… 2000 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 318 KB ๐Ÿ‘ 1 views

We present an analysis of the effect of the last-come-first-served heuristic on a linear probing hash table. We study the behavior of successful searches, assuming searches for all elements of the table are equally likely. It is known that the Robin Hood heuristic achieves minimum variance over all

"Fast" Linear Prediction and Its Applica
โœ H. Gesmar; P.C. Hansen ๐Ÿ“‚ Article ๐Ÿ“… 1994 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 375 KB

A general "fast" linear-prediction (FLP) algorithm is presented. It determines \(P\) linear-prediction coefficients from \(M\) equations in \(\sim 9 M P+27 / 2 P^{2}\) operations by using only \(\sim 5(M\) \(+P)\) locations of memory. The procedure does not rely on any assumption about the signal to

A fast neural net training algorithm and
โœ Thea Ghiselli-Crippa; Amro El-Jaroudi ๐Ÿ“‚ Article ๐Ÿ“… 1993 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 832 KB

This paper describes a fast training algorithm for feedforward neural nets, as applied to a two-layer neural network to classify segments of speech as voiced, unvoiced, or silence. The speech classification method is based on five features computed for each speech segment and used as input to the ne