Abstract: This paper presents a detailed analysis of lightweight hash functions in the context of Internet of Things (IoT) security. With the proliferation of resource-constrained IoT devices, ...
Abstract: This paper considers the basic question of how strong of a probabilistic guarantee can a hash table, storing $n(1+\Theta(1))\log n$-bit key/value pairs ...