Cuckoo hashing in cryptography: optimal parameters, robustness and applications (Q6149606): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: De-amortized Cuckoo Hashing: Provable Worst-Case Performance and Experimental Results / rank
 
Normal rank
Property / cites work
 
Property / cites work: OptORAMa: optimal oblivious RAM / rank
 
Normal rank
Property / cites work
 
Property / cites work: Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Explicit and efficient hash families suffice for cuckoo hashing with a stash / rank
 
Normal rank
Property / cites work
 
Property / cites work: Balanced allocations (extended abstract) / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Framework for Adversarially Robust Streaming Algorithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hardness-preserving reductions via cuckoo hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: SSE and SSD: page-efficient searchable symmetric encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5090388 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4526995 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Private information retrieval / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cuckoo hashing: Further analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tight Thresholds for Cuckoo Hashing via XORSAT / rank
 
Normal rank
Property / cites work
 
Property / cites work: Balanced allocation and dictionaries with tightly packed constant size bins / rank
 
Normal rank
Property / cites work
 
Property / cites work: \textsf{Catalic}: delegated PSI cardinality with applications to contact tracing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Property-preserving hash functions for Hamming distance from standard assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Space efficient hash tables with worst case constant access time / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Insertion Time of Cuckoo Hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Analysis of Random-Walk Cuckoo Hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Oblivious key-value stores and amplification for private set intersection / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automata, Languages and Programming / rank
 
Normal rank
Property / cites work
 
Property / cites work: Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-query Computationally-Private Information Retrieval with Constant Communication Rate / rank
 
Normal rank
Property / cites work
 
Property / cites work: How robust are linear sketches to adaptive inputs? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Alibi: a flaw in cuckoo-hashing based hierarchical ORAM schemes and a solution / rank
 
Normal rank
Property / cites work
 
Property / cites work: Nearly optimal property preserving hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Batch codes and their applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Balls into Bins Made Faster / rank
 
Normal rank
Property / cites work
 
Property / cites work: More Robust Hashing: Cuckoo Hashing with a Stash / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5743385 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3575013 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generalized cuckoo hashing with a stash, revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sketching in Adversarial Environments / rank
 
Normal rank
Property / cites work
 
Property / cites work: History-Independent Cuckoo Hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bloom Filters in Adversarial Environments / rank
 
Normal rank
Property / cites work
 
Property / cites work: Uniform Hashing in Constant Time and Optimal Space / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cuckoo hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Oblivious RAM Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: PSI from PaXoS: fast, malicious private set intersection / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient circuit-based PSI via cuckoo hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Power of Simple Tabulation Hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Batch Codes Through Dense Graphs Without Short Cycles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4788604 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lower bounds for (batch) PIR with private preprocessing / rank
 
Normal rank

Latest revision as of 11:58, 26 August 2024

scientific article; zbMATH DE number 7800210
Language Label Description Also known as
English
Cuckoo hashing in cryptography: optimal parameters, robustness and applications
scientific article; zbMATH DE number 7800210

    Statements

    Cuckoo hashing in cryptography: optimal parameters, robustness and applications (English)
    0 references
    0 references
    6 February 2024
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers