2014
DOI: 10.1002/coin.12033
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Design of Noncryptographic Hash Functions Using Genetic Programming

Abstract: Noncryptographic hash functions have an immense number of important practical applications owing to their powerful search properties. However, those properties critically depend on good designs: Inappropriately chosen hash functions are a very common source of performance losses. On the other hand, hash functions are difficult to design: They are extremely nonlinear and counterintuitive, and relationships between the variables are often intricate and obscure. In this work, we demonstrate the utility of genetic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…When using these data, NCHFs can be applied with different padding schemes, load factors, and table sizes [2] , but we recommend always using them equally for sake of consistency when comparing performances. In the case of using these data sets for generating new NCHFs with machine learning techniques, then they are split into training and test datasets in a random 70%–30% proportion, a minimum 5 k-fold is recommended for cross validation.…”
Section: Datamentioning
confidence: 99%
“…When using these data, NCHFs can be applied with different padding schemes, load factors, and table sizes [2] , but we recommend always using them equally for sake of consistency when comparing performances. In the case of using these data sets for generating new NCHFs with machine learning techniques, then they are split into training and test datasets in a random 70%–30% proportion, a minimum 5 k-fold is recommended for cross validation.…”
Section: Datamentioning
confidence: 99%
“…Independent of the inputs of a hash functions, they are optimized to work very well in different scenarios. The criteria for optimization is based on the assertion that, with hash functions, there should be equal probability with the generation of each output and a little change in inputs, must result in a huge change in outputs [17].…”
Section: Introductionmentioning
confidence: 99%