scispace - formally typeset
Search or ask a question

Showing papers on "Feature hashing published in 2000"


Patent
31 Oct 2000
TL;DR: In this paper, a hashing structure including multiple sub-hashes is used to determine whether an input value matches one or more of multiple target values, such as security identifiers in an access control system.
Abstract: A hashing structure including multiple sub-hashes is used to determine whether an input value matches one or more of multiple target values. These values can be of any form, such as security identifiers in an access control system. To make the determination, a hash key is obtained from the input value and multiple sub-hash indexes (one for each of the multiple sub-hashes) are generated based on the key. Values are identified from the multiple sub-hashes by indexing into the sub-hashes using respective ones of the sub-hash indexes. These values are then combined to generate a resultant hash value. Each of the multiple target values corresponds to one of multiple portions of the resultant hash value. If the portion corresponding to one of the target values has a particular value, then that target value is a likely match and is compared to the input value to determine if indeed the two match. This comparison can then be repeated for each target value with a corresponding portion in the resultant hash value that has the particular value.

30 citations


Journal Article
TL;DR: It is shown that for various choices of the parameters in the SL 2 (IF 2n ) hashing scheme, suggested by Tillich and Zemor, messages can be modified without changing the hash value.
Abstract: We show that for various choices of the parameters in the SL 2 (IF 2n ) hashing scheme, suggested by Tillich and Zemor, messages can be modified without changing the hash value. Moreover, examples of hash functions with a trapdoor within this family are given. Due to these weaknesses one should impose at least certain restrictions on the allowed parameter values when using the SL 2 (IF 2n ) hashing scheme for cryptographic purposes.

10 citations