Evolutionary hash functions for specific domains

作者: Yago Saez , Cesar Estebanez , David Quintana , Pedro Isasi

DOI: 10.1016/J.ASOC.2019.02.014

关键词:

摘要: Abstract Hash functions are a key component of many essential applications, ranging from compilers, databases or internet browsers to videogames network devices. The same reduced set extensively used and have become “standard de facto” since they provide very efficient results in searches over unsorted sets. However, depending on the characteristics data being hashed, overall performance these non-cryptographic hash can vary dramatically, becoming common source loss. difficult design, extremely non-linear counter-intuitive, relationships among variables often intricate obscure. Surprisingly, little scientific research is devoted design experimental assessment widely functions. In this work, addition performing an up-to-date comparison state-of-the-art functions, we propose use evolutionary techniques for designing “ad hoc” Thus, genetic programming will be automatically tailor-made function that continuously evolved if needed, so it always adapted real-world dynamic environments. To validate proposed approach, compared several quality metrics generated most across eight different scenarios. outperformed those cases tested.

参考文章(37)
Sean Luke, When short runs beat long runs genetic and evolutionary computation conference. pp. 74- 80 ,(2001)
Riccardo Poli, William B. Langdon, Nicholas F. McPhee, John R. Koza, A Field Guide to Genetic Programming ,(2008)
Jean-Philippe Aumasson, Daniel J. Bernstein, SipHash: A Fast Short-Input PRF Lecture Notes in Computer Science. pp. 489- 508 ,(2012) , 10.1007/978-3-642-34931-7_28
Piotr Indyk, Aristides Gionis, Rajeev Motwani, Similarity Search in High Dimensions via Hashing very large data bases. pp. 518- 529 ,(1999)
César Estébanez, Yago Saez, Gustavo Recio, Pedro Isasi, Performance of the most common non-cryptographic hashfunctions Software - Practice and Experience. ,vol. 44, pp. 681- 698 ,(2014) , 10.1002/SPE.2179
David R. Hanson, Christopher W. Fraser, A Retargetable C Compiler: Design and Implementation ,(1995)
Scott A. Crosby, Dan S. Wallach, Denial of service via algorithmic complexity attacks usenix security symposium. pp. 3- 3 ,(2003)
Riccardo Poli, William B. Langdon, Foundations of Genetic Programming ,(2002)
Roberto Tamassia, Michael T. Goodrich, Algorithm Design: Foundations, Analysis, and Internet Examples ,(2001)