Compact Implementations of LSH View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2016

AUTHORS

Taehwan Park , Hwajeong Seo , Zhe Liu , Jongseok Choi , Howon Kim

ABSTRACT

In ICISC’14, a new hash function family named LSH was released. The algorithm is secure against all critical hash function attacks and has simple ARX architecture with multiple data sets, which are computed in same operation. This nice features are well suited on modern parallel computer architectures such as SIMD (Single Instruction Multiple Data). The software efficiency of LSH is four times faster than SHA-3 and 1.5–2.3 times faster than other SHA-3 finalists over modern SIMD architectures. In this paper, we introduce the implementations of LSH hash functions for low-end embedded processors. The results show that LSH function are efficient enough to perform the operation over resource challenging processors so far. More... »

PAGES

41-53

References to SciGraph publications

Book

TITLE

Information Security Applications

ISBN

978-3-319-31874-5
978-3-319-31875-2

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_4

DOI

http://dx.doi.org/10.1007/978-3-319-31875-2_4

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1010165176


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computer Software", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Pusan National University", 
          "id": "https://www.grid.ac/institutes/grid.262229.f", 
          "name": [
            "School of Computer Science and Engineering, Pusan National University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Park", 
        "givenName": "Taehwan", 
        "id": "sg:person.014133561767.73", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014133561767.73"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Pusan National University", 
          "id": "https://www.grid.ac/institutes/grid.262229.f", 
          "name": [
            "School of Computer Science and Engineering, Pusan National University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Seo", 
        "givenName": "Hwajeong", 
        "id": "sg:person.015101423711.26", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015101423711.26"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Luxembourg", 
          "id": "https://www.grid.ac/institutes/grid.16008.3f", 
          "name": [
            "Laboratory of Algorithmics, Cryptology and Security (LACS), University of Luxembourg"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Liu", 
        "givenName": "Zhe", 
        "id": "sg:person.013144776623.84", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013144776623.84"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Pusan National University", 
          "id": "https://www.grid.ac/institutes/grid.262229.f", 
          "name": [
            "School of Computer Science and Engineering, Pusan National University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Choi", 
        "givenName": "Jongseok", 
        "id": "sg:person.016515567115.78", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016515567115.78"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Pusan National University", 
          "id": "https://www.grid.ac/institutes/grid.262229.f", 
          "name": [
            "School of Computer Science and Engineering, Pusan National University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Kim", 
        "givenName": "Howon", 
        "id": "sg:person.010610076315.82", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010610076315.82"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "sg:pub.10.1007/s13389-012-0029-z", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1002198320", 
          "https://doi.org/10.1007/s13389-012-0029-z"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-37288-9_11", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1034041566", 
          "https://doi.org/10.1007/978-3-642-37288-9_11"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.3934/amc.2010.4.169", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1071730649"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2016", 
    "datePublishedReg": "2016-01-01", 
    "description": "In ICISC\u201914, a new hash function family named LSH was released. The algorithm is secure against all critical hash function attacks and has simple ARX architecture with multiple data sets, which are computed in same operation. This nice features are well suited on modern parallel computer architectures such as SIMD (Single Instruction Multiple Data). The software efficiency of LSH is four times faster than SHA-3 and 1.5\u20132.3 times faster than other SHA-3 finalists over modern SIMD architectures. In this paper, we introduce the implementations of LSH hash functions for low-end embedded processors. The results show that LSH function are efficient enough to perform the operation over resource challenging processors so far.", 
    "editor": [
      {
        "familyName": "Kim", 
        "givenName": "Ho-won", 
        "type": "Person"
      }, 
      {
        "familyName": "Choi", 
        "givenName": "Dooho", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-31875-2_4", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-31874-5", 
        "978-3-319-31875-2"
      ], 
      "name": "Information Security Applications", 
      "type": "Book"
    }, 
    "name": "Compact Implementations of LSH", 
    "pagination": "41-53", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-31875-2_4"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "306d94c5e3fe8749f4f8b16cd39c61b69f1bf1914e9f63348612a62903039da3"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1010165176"
        ]
      }
    ], 
    "publisher": {
      "location": "Cham", 
      "name": "Springer International Publishing", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-31875-2_4", 
      "https://app.dimensions.ai/details/publication/pub.1010165176"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T13:26", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8664_00000249.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/978-3-319-31875-2_4"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_4'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_4'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_4'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_4'


 

This table displays all metadata directly associated to this object as RDF triples.

112 TRIPLES      23 PREDICATES      30 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-31875-2_4 schema:about anzsrc-for:08
2 anzsrc-for:0803
3 schema:author N69d5f7028c294cf09ee8a353ac0f0770
4 schema:citation sg:pub.10.1007/978-3-642-37288-9_11
5 sg:pub.10.1007/s13389-012-0029-z
6 https://doi.org/10.3934/amc.2010.4.169
7 schema:datePublished 2016
8 schema:datePublishedReg 2016-01-01
9 schema:description In ICISC’14, a new hash function family named LSH was released. The algorithm is secure against all critical hash function attacks and has simple ARX architecture with multiple data sets, which are computed in same operation. This nice features are well suited on modern parallel computer architectures such as SIMD (Single Instruction Multiple Data). The software efficiency of LSH is four times faster than SHA-3 and 1.5–2.3 times faster than other SHA-3 finalists over modern SIMD architectures. In this paper, we introduce the implementations of LSH hash functions for low-end embedded processors. The results show that LSH function are efficient enough to perform the operation over resource challenging processors so far.
10 schema:editor N0ccb5a89bce94a879012d1a9981b8870
11 schema:genre chapter
12 schema:inLanguage en
13 schema:isAccessibleForFree false
14 schema:isPartOf N86dd89d8974542b5b2e9d0eafb292cd6
15 schema:name Compact Implementations of LSH
16 schema:pagination 41-53
17 schema:productId N549aa4e3edad4054bb5dba1487cf833f
18 Na53814df3cb24fa99ad3bb6c8d1703cc
19 Nff3f3ad8032545f7bf07b9d1da244595
20 schema:publisher N42f88bcaa7d14e508fed2cfa5f039f28
21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1010165176
22 https://doi.org/10.1007/978-3-319-31875-2_4
23 schema:sdDatePublished 2019-04-15T13:26
24 schema:sdLicense https://scigraph.springernature.com/explorer/license/
25 schema:sdPublisher N51fbea781c314b43ba14c00a3f736a5a
26 schema:url http://link.springer.com/10.1007/978-3-319-31875-2_4
27 sgo:license sg:explorer/license/
28 sgo:sdDataset chapters
29 rdf:type schema:Chapter
30 N0ccb5a89bce94a879012d1a9981b8870 rdf:first N3f3c3984ea9a4dd08bb4873421f36b7d
31 rdf:rest Nfaeddca3ec1544149ce8d505cf8dc3b8
32 N336046df73ef4a4596c1c4117823198e schema:familyName Choi
33 schema:givenName Dooho
34 rdf:type schema:Person
35 N3f3c3984ea9a4dd08bb4873421f36b7d schema:familyName Kim
36 schema:givenName Ho-won
37 rdf:type schema:Person
38 N42f88bcaa7d14e508fed2cfa5f039f28 schema:location Cham
39 schema:name Springer International Publishing
40 rdf:type schema:Organisation
41 N51fbea781c314b43ba14c00a3f736a5a schema:name Springer Nature - SN SciGraph project
42 rdf:type schema:Organization
43 N549aa4e3edad4054bb5dba1487cf833f schema:name dimensions_id
44 schema:value pub.1010165176
45 rdf:type schema:PropertyValue
46 N599cb1c58912487db0b92eef35f598f7 rdf:first sg:person.010610076315.82
47 rdf:rest rdf:nil
48 N69d5f7028c294cf09ee8a353ac0f0770 rdf:first sg:person.014133561767.73
49 rdf:rest Nb28a1b97308c491184a5a59e552ba3e7
50 N86dd89d8974542b5b2e9d0eafb292cd6 schema:isbn 978-3-319-31874-5
51 978-3-319-31875-2
52 schema:name Information Security Applications
53 rdf:type schema:Book
54 Na53814df3cb24fa99ad3bb6c8d1703cc schema:name readcube_id
55 schema:value 306d94c5e3fe8749f4f8b16cd39c61b69f1bf1914e9f63348612a62903039da3
56 rdf:type schema:PropertyValue
57 Nb28a1b97308c491184a5a59e552ba3e7 rdf:first sg:person.015101423711.26
58 rdf:rest Ne67961ddbb174227aea276b57583be57
59 Ncb7e3f3377754b658ca97d126d1b2076 rdf:first sg:person.016515567115.78
60 rdf:rest N599cb1c58912487db0b92eef35f598f7
61 Ne67961ddbb174227aea276b57583be57 rdf:first sg:person.013144776623.84
62 rdf:rest Ncb7e3f3377754b658ca97d126d1b2076
63 Nfaeddca3ec1544149ce8d505cf8dc3b8 rdf:first N336046df73ef4a4596c1c4117823198e
64 rdf:rest rdf:nil
65 Nff3f3ad8032545f7bf07b9d1da244595 schema:name doi
66 schema:value 10.1007/978-3-319-31875-2_4
67 rdf:type schema:PropertyValue
68 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
69 schema:name Information and Computing Sciences
70 rdf:type schema:DefinedTerm
71 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
72 schema:name Computer Software
73 rdf:type schema:DefinedTerm
74 sg:person.010610076315.82 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
75 schema:familyName Kim
76 schema:givenName Howon
77 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010610076315.82
78 rdf:type schema:Person
79 sg:person.013144776623.84 schema:affiliation https://www.grid.ac/institutes/grid.16008.3f
80 schema:familyName Liu
81 schema:givenName Zhe
82 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013144776623.84
83 rdf:type schema:Person
84 sg:person.014133561767.73 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
85 schema:familyName Park
86 schema:givenName Taehwan
87 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014133561767.73
88 rdf:type schema:Person
89 sg:person.015101423711.26 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
90 schema:familyName Seo
91 schema:givenName Hwajeong
92 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015101423711.26
93 rdf:type schema:Person
94 sg:person.016515567115.78 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
95 schema:familyName Choi
96 schema:givenName Jongseok
97 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016515567115.78
98 rdf:type schema:Person
99 sg:pub.10.1007/978-3-642-37288-9_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034041566
100 https://doi.org/10.1007/978-3-642-37288-9_11
101 rdf:type schema:CreativeWork
102 sg:pub.10.1007/s13389-012-0029-z schema:sameAs https://app.dimensions.ai/details/publication/pub.1002198320
103 https://doi.org/10.1007/s13389-012-0029-z
104 rdf:type schema:CreativeWork
105 https://doi.org/10.3934/amc.2010.4.169 schema:sameAs https://app.dimensions.ai/details/publication/pub.1071730649
106 rdf:type schema:CreativeWork
107 https://www.grid.ac/institutes/grid.16008.3f schema:alternateName University of Luxembourg
108 schema:name Laboratory of Algorithmics, Cryptology and Security (LACS), University of Luxembourg
109 rdf:type schema:Organization
110 https://www.grid.ac/institutes/grid.262229.f schema:alternateName Pusan National University
111 schema:name School of Computer Science and Engineering, Pusan National University
112 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...