hashing   3239

« earlier    

An Introduction to Hashing in the Era of Machine Learning
In December 2017, researchers at Google and MIT published a provocative research paper about their efforts into “learned index structures”. The research is quite exciting, as the authors state in the…
hashing  machinelearning 
yesterday by leifur
An Introduction to Hashing in the Era of Machine Learning
In December 2017, researchers at Google and MIT published a provocative research paper about their efforts into “learned index structures”. The research is quite exciting, as the authors state in the…
hashing  database  indexing  machine_learning 
yesterday by mac
Consistent hashing, a guide & Go implementation – Senthil – Medium
Consistent hashing is deceptively simple yet very powerful, but I didn’t quite understand what it was till I sat down and worked it out for myself. Before I tell you about consistent hashing, you…
golang  hashing  algorithm 
13 days ago by sandipb
Arvind Narayanan on Twitter: "Four cents to deanonymize: Companies reverse hashed email addresses https://t.co/ADBmYIk9U0 Many companies offer email addresses deanonymization, reversing the (superficial) privacy protection afforded by hashing. Hashed emai
4 cents to reverse out email addresses from hashes. I guess the pre-image space of email addresses is not very large? You need more iterations to increase the cost to attackers, but that may not be enough for a limited space like this. Normally you would add a large salt to increase the size of the space, but the ability to do that might depend on the application.
hashing  cryptography  computation  cost 
15 days ago by jcretan

« earlier    

related tags

****  aknn  algorithm  algorithms  analysis  approximation  approxnearestneighbors  approxsimilarityjoin  argon2  article  aspnetcore  atoms  attack  authentication  b-tree  benchmark  bitcoin  blockchain  browser  c++  c-programming  c  caching  carmack  checksum  commandline  comparison  computation  computer-science  computer-vision  computerscience  consistent-hashing  consistent  consistent_hashing  contrarianism  cost  crypto  cryptocurrency  cryptography  css  cuckoo  data-structures  data_structures  database  databases  datastores  datastructure  datastructures  ddos  decentralized  deep-learning  detection  discovery  distributed  distributed_computing  djb2  documentation  duplicate  encryption  engineering  etsy  explained  explanation  facebook  forensics  frontier  fuzzy  gan  generative  generator  github  go  golang  google  gwern  hash  hashes  highwayhash  ideas  image-hash  image-hashing  image  indexes  indexing  innovation  java  javascript  key-value  learned  learning-to-hash  learning  library  libsodium  locality  lsh  mac  machine-learning  machine_learning  machinelearning  math  md5  merkle  michael-mitzenmacher  minimal  minimal_perfect_hashing  minimum-viable  ml  multi-modal  novelty  number-theory  open-addressing  opensource  p2p  package  paper  papers  password  passwords  perfect  perfect_hashing  photo  photodna  picture  postcss  postquantum  pragmatic  probability  profit  programming  protocol  pycrypto  pynacl  python  pytorch  ratty  reference  reflection  research-article  research  rhetoric  rigorous-crypto  robin-hood-hashing  roots  salt  salting  searching  security  sensitive  sha1  sha256  sharding  shipping  siamese  similarity  siphash  software  solution  song  sourcecode  spark  stanford  strings  surveys  swift  szabo  tools  trees  tries  triplet  tutorial  tutorials  utility  video  webpack  wikipedia  windows 

Copy this bookmark:



description:


tags: