2004
DOI: 10.1016/j.jalgor.2003.12.002
|View full text |Cite
|
Sign up to set email alerts
|

Cuckoo hashing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
324
0
3

Year Published

2011
2011
2020
2020

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 827 publications
(328 citation statements)
references
References 27 publications
(47 reference statements)
1
324
0
3
Order By: Relevance
“…The case of d = 2 choices is notably different from that for other values of d and the theory for the case where there are d = 2 bucket choices for each item is well understood at this point [9,20,22]. We will therefore assume that d ≥ 3.…”
Section: Introductionmentioning
confidence: 99%
“…The case of d = 2 choices is notably different from that for other values of d and the theory for the case where there are d = 2 bucket choices for each item is well understood at this point [9,20,22]. We will therefore assume that d ≥ 3.…”
Section: Introductionmentioning
confidence: 99%
“…This phenomenon was experimentally observed long ago in the setting of Bloom filters [31]; other reported examples include [6,10,26,30,32]. Thus, it does not seem truly necessary to use the more complex hash functions for which this kind of performance can be proven.…”
Section: Introductionmentioning
confidence: 88%
“…There are other variations on this scheme, including the asymmetric version due to Vöcking [41] and cuckoo hashing [26]; we choose to study the original setting for simplicity.…”
Section: Balanced Allocationsmentioning
confidence: 99%
See 1 more Smart Citation
“…An encrypted cuckoo table [25,20] consists of three arrays (T 1 , T 2 , S) that hold ciphertexts of some fixed length. The arrays T 1 and T 2 are both of size m and serve as cuckoo-hash tables while S is an array of size s and serves as an auxiliary stash.…”
Section: Technical Toolsmentioning
confidence: 99%