Filters








180 Hits in 3.0 sec

Hardness Preserving Reductions via Cuckoo Hashing [chapter]

Itay Berman, Iftach Haitner, Ilan Komargodski, Moni Naor
2013 Lecture Notes in Computer Science  
(ii) A security-preserving reduction from non-adaptive to adaptive PRFs.  ...  In this work we show how to go beyond the birthday attack barrier, by replacing the above simple hashing approach with a variant of cuckoo hashing -a hashing paradigm typically used for resolving hash  ...  Hardness Preserving PRG to PRF Reductions An important corollary of Theorem 6 is a security preserving reduction from pseudorandom generators to pseudorandom functions.  ... 
doi:10.1007/978-3-642-36594-2_3 fatcat:dzbi7s7nhvhjbf7y7n6jdbjzma

Cuckoo Feature Hashing: Dynamic Weight Sharing for Sparse Analytics

Jinyang Gao, Beng Chin Ooi, Yanyan Shen, Wang-Chien Lee
2018 Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence  
In this paper, we develop a feature hashing scheme called Cuckoo Feature Hashing(CCFH) based on the principle behind Cuckoo hashing, a hashing scheme designed to resolve collisions.  ...  Feature hashing is widely used to process large scale sparse features for learning of predictive models. Collisions inherently happen in the hashing process and hurt the model performance.  ...  Second, Cuckoo hashing resolves collisions via its recurrent displacing operations, while it is not clear how such collision resolving scheme can be realized during model training.  ... 
doi:10.24963/ijcai.2018/295 dblp:conf/ijcai/GaoOSL18 fatcat:p3qwo7un5vesxlntm2pmylmioe

Cuckoo Linear Algebra

Li Zhou, David G. Andersen, Mu Li, Alexander J. Smola
2015 Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD '15  
In this paper we present a novel data structure for sparse vectors based on Cuckoo hashing. It is highly memory efficient and allows for random access at near dense vector level rates.  ...  Our approach provides a feasible alternative to the hash kernel and it excels whenever exact solutions are required, such as for feature selection.  ...  The authors thank Paul Bradley, Tyler Johnson, and Carlos Guestrin for inspiring discussions and experimental investigation in the context of hash kernels and sparsity and  ... 
doi:10.1145/2783258.2783263 dblp:conf/kdd/ZhouALS15 fatcat:4yxucl73fzgrjopfhfgymq5eji

Cuckoo sampling: Robust collection of flow aggregates under a fixed memory budget

Josep Sanjuaas-Cuxart, Pere Barlet-Ros, Nick Duffield, Ramana Kompella
2012 2012 Proceedings IEEE INFOCOM  
We present a novel flow sampling based measurement scheme called Cuckoo Sampling that efficiently collects per-flow aggregates, while smoothly discarding information as it exceeds the available memory.  ...  This is reminiscent of the way the Cuckoo Hashing [21] data structure operates; hence, we have named our technique Cuckoo Sampling.  ...  Traditional hash tables or other kind of dictionaries, including those based on Cuckoo Hashing [21] , require collision management.  ... 
doi:10.1109/infcom.2012.6195693 dblp:conf/infocom/Sanjuas-CuxartBDK12 fatcat:n6rpuil4nvdkbcxbuiiwijd4jy

FlashStore

Biplob Debnath, Sudipta Sengupta, Jin Li
2010 Proceedings of the VLDB Endowment  
It uses an in-memory hash table to index them, with hash collisions resolved by a variant of cuckoo hashing.  ...  as a cache above hard disk but also in its use of flash aware algorithms.  ...  Cuckoo hashing to resolve hash collisions: FlashStore uses a variant of cuckoo hashing [34] to resolve collisions.  ... 
doi:10.14778/1920841.1921015 fatcat:43pse6ie3fajziwurjt4d3cc7q

Data-Parallel Hashing Techniques for GPU Architectures [article]

Brenton Lessley
2018 arXiv   pre-print
This study surveys the state-of-the-art research on data-parallel hashing techniques for emerging massively-parallel, many-core GPU architectures.  ...  Key factors affecting the performance of different hashing schemes are discovered and used to suggest best practices and pinpoint areas for further research.  ...  If unsuccessful, the query key is hashed, via its second cuckoo hash function, into an alternative bucket.  ... 
arXiv:1807.04345v1 fatcat:hjqikv3wjfgahavy3lbweolhh4

Implementing Signatures for Transactional Memory

Daniel Sanchez, Luke Yen, Mark D. Hill, Karthikeyan Sankaralingam
2007 Microarchitecture (MICRO), Proceedings of the Annual International Symposium on  
First, Cuckoo-Bloom signatures adapt cuckoo hashing for hardware implementation and build an accurate hash-table based representation of small read/write sets (an important and common case), and morph  ...  Address Address Add operation Test operation Address Reduction / Test logic  ...  Cuckoo-Bloom signatures, which adapt cuckoo hashing [32] 3.  ... 
doi:10.1109/micro.2007.4408250 fatcat:aidifitegzh2ha2warhb7s5weq

Implementing Signatures for Transactional Memory

Daniel Sanchez, Luke Yen, Mark D. Hill, Karthikeyan Sankaralingam
2007 40th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO 2007)  
First, Cuckoo-Bloom signatures adapt cuckoo hashing for hardware implementation and build an accurate hash-table based representation of small read/write sets (an important and common case), and morph  ...  Address Address Add operation Test operation Address Reduction / Test logic  ...  Cuckoo-Bloom signatures, which adapt cuckoo hashing [32] 3.  ... 
doi:10.1109/micro.2007.24 dblp:conf/micro/SanchezYHS07 fatcat:ebyec44fqbdnlnp4zwk7mazlt4

Efficient Set Intersection with Simulation-Based Security

Michael J. Freedman, Carmit Hazay, Kobbi Nissim, Benny Pinkas
2014 Journal of Cryptology  
In this work we present protocols based on the use of homomorphic encryption and different hashing schemes for both the semi-honest and malicious environments.  ...  While this would preserve the complexity of these protocols asymptotically (in m 1 , m 2 ), introducing such proofs would probably make this protocol impractical since there is no efficient known way to  ...  Using Cuckoo hash. Cuckoo hash [PR04] is a multiple-choice hashing scheme with evictions.  ... 
doi:10.1007/s00145-014-9190-0 fatcat:zgqlrpxlhnfa7bshaexepidvpa

The Circle Game

Sandeep Tamrakar, Jian Liu, Andrew Paverd, Jan-Erik Ekberg, Benny Pinkas, N. Asokan
2017 Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17  
Users communicate with the trusted hardware via secure channels.  ...  We use a variant, called d-ary Cuckoo hash with four hash functions, since it utilizes approximately 97% of the hash table (compared to less than 50% utilization in standard Cuckoo hash with two hash functions  ...  hash Cuckoo hash is another data structure for efficient membership test [26] .  ... 
doi:10.1145/3052973.3053006 dblp:conf/ccs/TamrakarLPEPA17 fatcat:5qx4jmvsjje6ljgmxe6hz3wdku

Talek: Private Group Messaging with Hidden Access Patterns [article]

Raymond Cheng, William Scott, Elisaweta Masserova, Irene Zhang, Vipul Goyal, Thomas Anderson, Arvind Krishnamurthy, Bryan Parno
2020 arXiv   pre-print
., a novel use of blocked cuckoo hashing and support for private notifications. The latter provide a private, efficient mechanism for users to learn, without polling, which logs have new messages.  ...  Second, it is hard to know which log to poll at any given time.  ...  Client writes specify two random buckets in which each message can be placed, forming a blocked cuckoo hash table. Logs are spread over the hash table, and read using PIR.  ... 
arXiv:2001.08250v2 fatcat:yc45ibv7lrebfcx4m327eiibpu

Efficient Circuit-Based PSI with Linear Communication [chapter]

Benny Pinkas, Thomas Schneider, Oleksandr Tkachenko, Avishay Yanai
2019 Lecture Notes in Computer Science  
The protocol of [PSSZ15] (denoted "Circuit-Phasing") has P 1 map its items to a table using Cuckoo hashing, and P 2 maps its items using simple hashing.  ...  A recent circuit-based PSI construction [PSWW18] is based on a new hashing algorithm, denoted "two-dimensional Cuckoo hashing", which uses a table of size O(n) and a stash of size ω(1).  ...  Linear Communication via Stash-Less Cuckoo Hashing The largest communication cost factor in our protocols is the secure evaluation of the circuit.  ... 
doi:10.1007/978-3-030-17659-4_5 fatcat:bpiegzinpna5flnzcvoxtmw3m4

Scaling Up Clustered Network Appliances with ScaleBricks

Dong Zhou, Bin Fan, Hyeontaek Lim, David G. Andersen, Michael Kaminsky, Michael Mitzenmacher, Ren Wang, Ajaypal Singh
2015 Computer communication review  
We assign each slot in the cuckoo hash table a logical "slot number."  ...  CuckooSwitch [34] used a concurrent cuckoo hash table to build a FIB that maps MAC addresses to output ports.  ... 
doi:10.1145/2829988.2787503 fatcat:d5g245zbtzh23bthna4pkigyme

Scaling Up Clustered Network Appliances with ScaleBricks

Dong Zhou, Bin Fan, Hyeontaek Lim, David G. Andersen, Michael Kaminsky, Michael Mitzenmacher, Ren Wang, Ajaypal Singh
2015 Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication - SIGCOMM '15  
We assign each slot in the cuckoo hash table a logical "slot number."  ...  CuckooSwitch [34] used a concurrent cuckoo hash table to build a FIB that maps MAC addresses to output ports.  ... 
doi:10.1145/2785956.2787503 dblp:conf/sigcomm/ZhouFLAKMWS15 fatcat:5yyoqhxg4fhxdosktdkhhyk4zy

Might I Get Pwned: A Second Generation Compromised Credential Checking Service [article]

Bijeeta Pal, Mazharul Islam, Marina Sanusi, Nick Sullivan, Luke Valenta, Tara Whalen, Christopher Wood, Thomas Ristenpart, Rahul Chattejee
2022 arXiv   pre-print
MIGP preserves user privacy and limits potential exposure of sensitive breach entries. We show that the protocol is fast, with response time close to existing C3 services.  ...  The core underlying challenge is how to identify passwords that are similar to their leaked passwords while preserving honest clients' privacy and also preventing malicious clients from extracting breach  ...  We show that OMIGPGuess is NP-hard by giving a polynomial-time reduction of an arbitrary instance of OBDT problem to OMIGPGuess.  ... 
arXiv:2109.14490v2 fatcat:xgwtow5hyvdvbnsf6dnlbtrgsi
« Previous Showing results 1 — 15 out of 180 results