2019
DOI: 10.1007/978-3-030-12082-5_51
|View full text |Cite
|
Sign up to set email alerts
|

Secure Hash Function Constructing for Future Communication Systems and Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 7 publications
0
12
0
Order By: Relevance
“…Recently, significant progress has been made in the theory of non-binary codes. The new ternary and quaternary codes [30][31][32][33][34] are described. Attractive is the direction associated with the codes above the rings of deductions [35,36].…”
Section: Discussion Of Results Of Reducing the Signal Distance While Increasing The Operational Efficiency Of The Code Construct Of A Mulmentioning
confidence: 99%
“…Recently, significant progress has been made in the theory of non-binary codes. The new ternary and quaternary codes [30][31][32][33][34] are described. Attractive is the direction associated with the codes above the rings of deductions [35,36].…”
Section: Discussion Of Results Of Reducing the Signal Distance While Increasing The Operational Efficiency Of The Code Construct Of A Mulmentioning
confidence: 99%
“…The average value (6) for all 1 ( , ... , )  r r k k K is called the average probability of differential parameter  (EDP) and it can be defined by following formula [13]:…”
Section: Problem Statementmentioning
confidence: 99%
“…Therefore, the nearest neighbor query for high-dimensional data often uses a product quantization strategy, which is mapped to a low-dimensional subspace for approximate nearest neighbor retrieval. With its advantages in computing speed and storage efficiency, the hash method stands out among many Approximate Nearest Neighbor (ANN) [15], [16] retrieval methods, and is widely used in computer vision [17]- [20] and data security [21], [22] fields. With the in-depth study of deep learning, the performance of the deep hash method in computer vision is staggering, which not only reflected in the convenience of sample feature extraction, but also in performance improvement [23].…”
Section: Introductionmentioning
confidence: 99%