Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Cuckoo hashing - MaRDI portal

Cuckoo hashing

From MaRDI portal
Publication:4736815

DOI10.1016/j.jalgor.2003.12.002zbMath1091.68036OpenAlexW2912601938WikidataQ56021022 ScholiaQ56021022MaRDI QIDQ4736815

Flemming Friche Rodler, Rasmus Pagh

Publication date: 6 August 2004

Published in: Journal of Algorithms (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/j.jalgor.2003.12.002




Related Items (72)

Efficient set intersection with simulation-based securitySSE and SSD: page-efficient searchable symmetric encryptionHalftimeHash: modern hashing without 64-bit multipliers or finite fieldsSupport optimality and adaptive cuckoo filtersSharp load thresholds for cuckoo hashingMaximum matchings in random bipartite graphs and the space utilization of Cuckoo Hash tablesThe property suffix tree with dynamic propertiesBalanced allocation and dictionaries with tightly packed constant size binsHardness of peeling with stashesUnnamed ItemBloom Filters in Adversarial EnvironmentsHyper-minimisation Made EfficientOnline Stochastic Matching: Online Actions Based on Offline StatisticsLoad Thresholds for Cuckoo Hashing with Overlapping BlocksExternal-memory multimapsValidating the Knuth-Morris-Pratt failure function, fast and onlineScalable Load Balancing in Networked Systems: A Survey of Recent AdvancesCuCoTrack: cuckoo filter based connection trackingc-trie++: a dynamic trie tailored for fast prefix searchesBalanced allocation through random walkMPCCache: privacy-preserving multi-party cooperative cache sharing at the edgeLoad Thresholds for Cuckoo Hashing with Overlapping BlocksPhase transition in count approximation by count-min sketch with conservative updatesGeneralized cuckoo hashing with a stash, revisitedDynamic local searchable symmetric encryptionEfficient private set intersection cardinality protocol in the reverse unbalanced settingHardness-preserving reductions via cuckoo hashingEncapsulated search index: public-key, sub-linear, distributed, and delegatableAdaptively code-correlation robustness functions and its applications to private set intersectionThe universality of iterated hashing over variable-length stringsAn improved version of cuckoo hashing: average case analysis of construction cost and search operationsIndividual cryptographyCuckoo hashing in cryptography: optimal parameters, robustness and applicationsUniversal Hashing via Integer Arithmetic Without Primes, RevisitedUnnamed ItemBet-or-pass: adversarially robust Bloom filters\textsf{MacORAMa}: optimal oblivious RAM with integrityLow-contention data structuresOblivious RAM with worst-case logarithmic overheadApproximate nearest neighbor for curves: simple, efficient, and deterministicAn efficient state recovery attack on the X-FCSR family of stream ciphersHopscotch HashingCache-oblivious hashingExplicit and efficient hash families suffice for cuckoo hashing with a stashA generalized birthday approach for efficiently finding linear relations in \(\ell\)-sequencesTransactional memoryFully Dynamic Maximal Matching in $O(\log n)$ Update Time (Corrected Version)Privacy-Preserving Access of Outsourced Data via Oblivious RAM SimulationSearchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced AllocationsDynamic proofs of retrievability via oblivious RAMThresholds for extreme orientabilityDynamic space efficient hashingLayered hashing algorithm for real-time systemsPseudo-random graphs and bit probe schemes with one-sided errorUnnamed ItemWeaknesses of Cuckoo Hashing with a Simple Universal Hash Class: The Case of Large UniversesTight tradeoffs in searchable symmetric encryptionTowards a scalable and robust DHTDynamic Approximate All-Pairs Shortest Paths: Breaking the $O(mn)$ Barrier and DerandomizationVery fast construction of bounded‐degree spanning graphs via the semi‐random graph processRobust property-preserving hash functions for Hamming distance and moreAlibi: a flaw in cuckoo-hashing based hierarchical ORAM schemes and a solutionGarbage Collection for Reversible Functional LanguagesOblivious network RAM and leveraging parallelism to achieve obliviousnessDynamic Space Efficient Hashing.Load Thresholds for Cuckoo Hashing with Double HashingFully Dynamic Maximal Matching in $O(\log n)$ Update TimeUnnamed ItemTwo-sided malicious security for private intersection-sum with cardinalityPrivate set intersection in the internet setting from lightweight oblivious PRFAdaptive Cuckoo FiltersPSI from PaXoS: fast, malicious private set intersection




This page was built for publication: Cuckoo hashing