
2025-07-30 10:25:51
Privacy-Preserving Anonymization of System and Network Event Logs Using Salt-Based Hashing and Temporal Noise
Shreyas Bargale, Akshit Vakati Venkata, Jaimandeep Singh, Chester Rebeiro
https://arxiv.org/abs/2507.21904
Privacy-Preserving Anonymization of System and Network Event Logs Using Salt-Based Hashing and Temporal Noise
Shreyas Bargale, Akshit Vakati Venkata, Jaimandeep Singh, Chester Rebeiro
https://arxiv.org/abs/2507.21904
Spotlight Attention: Towards Efficient LLM Generation via Non-linear Hashing-based KV Cache Retrieval
Wenhao Li, Yuxin Zhang, Gen Luo, Haiyuan Wan, Ziyang Gong, Fei Chao, Rongrong Ji
https://arxiv.org/abs/2508.19740
Contrastive Multi-View Graph Hashing
Yang Xu, Zuliang Yang, Kai Ming Ting
https://arxiv.org/abs/2508.12377 https://arxiv.org/pdf/2508.12377
@… at https://cryptpad.fr/login/ I get the error described at
Efficient Algorithms for Quantum Hashing
Ilnar Zinnatullin, Kamil Khadiev
https://arxiv.org/abs/2507.07002 https://arxiv.org/pdf/2507…
Hashing for Fast Pattern Set Selection
Maiju Karjalainen, Pauli Miettinen
https://arxiv.org/abs/2507.08745 https://arxiv.org/pdf/2507…
KEENHash: Hashing Programs into Function-Aware Embeddings for Large-Scale Binary Code Similarity Analysis
Zhijie Liu, Qiyi Tang, Sen Nie, Shi Wu, Liang Feng Zhang, Yutian Tang
https://arxiv.org/abs/2506.11612
Quantum Error Correction Exploiting Degeneracy to Approach the Hashing Bound
Kenta Kasai
https://arxiv.org/abs/2506.15636 https://arx…
Modern Minimal Perfect Hashing: A Survey
Hans-Peter Lehmann, Thomas Mueller, Rasmus Pagh, Giulio Ermanno Pibiri, Peter Sanders, Sebastiano Vigna, Stefan Walzer
https://arxiv.org/abs/2506.06536
NIST is done standardizing #ASCON, an encryption and hashing algorithm. I count that as a big win for #IoT security, in particular because the last review round's raised concerns were heeded and there is now a 32-bit tag mode usable for applications such as 802.15.4 link-layer security.
Congratulations…
This https://arxiv.org/abs/2405.04406 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csIT_…
Replaced article(s) found for cs.PF. https://arxiv.org/list/cs.PF/new
[1/1]:
- PHast -- Perfect Hashing with fast evaluation
Piotr Beling, Peter Sanders
Succinct Oblivious Tensor Evaluation and Applications: Adaptively-Secure Laconic Function Evaluation and Trapdoor Hashing for All Circuits
Damiano Abram, Giulio Malavolta, Lawrence Roy
https://arxiv.org/abs/2508.09673
SMT-Sweep: Word-Level Representation Unification for Hardware Verification
Ziyi Yang, Guangyu Hu, Mingkai Miao, Changyuan Yu, Hongce Zhang
https://arxiv.org/abs/2507.02008
This https://arxiv.org/abs/2505.16133 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csIR_…
Protecting Small Organizations from AI Bots with Logrip: Hierarchical IP Hashing
Rama Carl Hoetzlein
https://arxiv.org/abs/2508.03130 https://arxiv.org/pdf…
Elementary Cellular Automata as Non-Cryptographic Hash Functions
Daniel McKinley
https://arxiv.org/abs/2506.06551 https://arxiv.org/p…
Vectorised Hashing Based on Bernstein-Rabin-Winograd Polynomials over Prime Order Fields
Kaushik Nath, Palash Sarkar
https://arxiv.org/abs/2507.06490 https…
Secure and practical Quantum Digital Signatures
Federico Grasselli, Gaetano Russo, Massimiliano Proietti
https://arxiv.org/abs/2508.05355 https://arxiv.org…
This https://arxiv.org/abs/2501.16007 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csCR_…