all InfoSec news
Linear Hashing with $\ell_\infty$ guarantees and two-sided Kakeya bounds
April 3, 2024, 4:11 a.m. | Manik Dhar, Zeev Dvir
cs.CR updates on arXiv.org arxiv.org
Abstract: We show that a randomly chosen linear map over a finite field gives a good hash function in the $\ell_\infty$ sense. More concretely, consider a set $S \subset \mathbb{F}_q^n$ and a randomly chosen linear map $L : \mathbb{F}_q^n \to \mathbb{F}_q^t$ with $q^t$ taken to be sufficiently smaller than $ |S|$. Let $U_S$ denote a random variable distributed uniformly on $S$. Our main theorem shows that, with high probability over the choice of $L$, the random …
arxiv cs.cc cs.cr function good hash hash function hashing linear map math.co taken
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Senior Security Officer
@ eSimplicity | Remote
Senior - Automated Cyber Attack Engineer
@ Deloitte | Madrid, España
Public Key Infrastructure (PKI) Senior Engineer
@ Sherwin-Williams | Cleveland, OH, United States
Consultant, Technology Consulting, Cyber Security - Privacy (Senior) (Multiple Positions) (1502793)
@ EY | Chicago, IL, US, 60606
Principal Associate, CSOC Analyst
@ Capital One | McLean, VA
Real Estate Portfolio & Corporate Security Lead
@ Lilium | Munich