Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,065,697 papers from all fields of science
Search
Sign In
Create Free Account
Collision (computer science)
Known as:
Collision (disambiguation)
, Hash collision
, Cryptographic hash collision
Expand
In computer science, a collision or clash is a situation that occurs when two distinct pieces of data have the same hash value, checksum, fingerprint…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
Birthday attack
Checksum
Collision attack
Collision domain
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Implementation of an Efficient Approach for Duplicate Detection System
R. Deshpande
,
S. Bodkhe
2017
Corpus ID: 212471826
-- Duplicate detection is the process of identifying multiple representations of same real world entities. The proposed System…
Expand
2017
2017
Rectangular hash table: Bloom filter and bitmap assisted hash table with high speed
Tong Yang
,
Binchao Yin
,
+4 authors
Xiaoming Li
IEEE International Conference on Big Data (Big…
2017
Corpus ID: 26099766
Hash table, a widely used data structure, can achieve an O(1) average lookup speed at the cost of large memory usage…
Expand
2016
2016
Accelerating Hash-Based Query Processing Operations on FPGAs by a Hash Table Caching Technique
Behzad Salami
,
Oriol Arcas
,
Nehir Sönmez
,
O. Unsal
,
A. Cristal
Latin American Conference on High Performance…
2016
Corpus ID: 45336225
Extracting valuable information from the rapidly growing field of Big Data faces serious performance constraints, especially in…
Expand
Review
2015
Review
2015
A Survey: Novel Approach Secure Authentication Technique by One Time Password using Mobile SMS
Preeti Ahlawat
,
Rainu Nandal
2015
Corpus ID: 63994761
In this paper we consider the potential of SMS- one time password (OTP) in results upgradation to get rid of around kinds of…
Expand
2013
2013
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation
Bo Zhu
,
Yin Tan
,
G. Gong
Cryptology and Network Security
2013
Corpus ID: 15168031
Galois/Counter Mode (GCM) is a block cipher mode of operation widely adopted in many practical applications and standards, such…
Expand
2012
2012
A Hash based Mining Algorithm for Maximal Frequent Item Sets using Double Hashing
N. G. Rao
,
Sirisha Aguru
2012
Corpus ID: 15492620
Data mining is the use of automated data analysis techniques to uncover previously undetected relationships among data items. In…
Expand
2008
2008
An Efficient Hardware-Based Multi-hash Scheme for High Speed IP Lookup
Socrates Demetriades
,
M. Hanna
,
Sangyeun Cho
,
R. Melhem
IEEE Symposium on High-Performance Interconnects
2008
Corpus ID: 914239
The increasingly more stringent performance and power requirements of Internet routers call for scalable IP lookup strategies…
Expand
2006
2006
A novel approach to detecting DDoS Attacks at an Early Stage
Bin Xiao
,
Wei Chen
,
Yanxiang He
Journal of Supercomputing
2006
Corpus ID: 13916780
Distributed Denial-of-Service (DDoS) attacks pose a serious threat to Internet security. Most current research focuses on…
Expand
2006
2006
Effect of Hash Collisions on the Performance of LAN Switching Devices and Networks
C. Huntley
,
G. Antonova
,
P. Guinand
Proceedings. 31st IEEE Conference on Local…
2006
Corpus ID: 15478288
Hash tables are often used in LAN switching devices for MAC address lookup. The lookup is a central function, which significantly…
Expand
2004
2004
Improving CAM-DH Protocol for Mobile Nodes with Constraint Computational Power
Yong-Hwan Lee
,
Ilsun You
,
Sang-Burm Rhee
International Conference on Knowledge-Based…
2004
Corpus ID: 20215994
CAM-DH is a publickey-based protocol for secure binding updates in Mobile IP V.6 (MIPv6), which combines the BAKE/2 protocol with…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE