1988
DOI: 10.1016/s0195-6698(88)80048-9
|View full text |Cite
|
Sign up to set email alerts
|

New Bounds for Perfect Hashing via Information Theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
91
0

Year Published

1998
1998
2016
2016

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 90 publications
(92 citation statements)
references
References 2 publications
1
91
0
Order By: Relevance
“…Improved lower bounds for the latter appears in [3,5,7]. For sake of completeness, we prove a weaker bound, which is sufficient for our purposes, and present the argument in probabilistic terms.…”
Section: Proof Of Theoremmentioning
confidence: 95%
“…Improved lower bounds for the latter appears in [3,5,7]. For sake of completeness, we prove a weaker bound, which is sufficient for our purposes, and present the argument in probabilistic terms.…”
Section: Proof Of Theoremmentioning
confidence: 95%
“…For r = k − 1, a slightly weaker version of this bound was proved in Fredman and Komlós (1984), and then extended to (??) by Körner and Marton (1988). All these proofs rely on certain techniques from information theory.…”
Section: Hash Functionsmentioning
confidence: 99%
“…An obvious necessary condition for the existence of a t-hashing family is q ≥ t; it turns out to be sufficient too (see [11], [22], [23], [29] for bounds on the rate of t-hashing families of growing length).…”
Section: Separationmentioning
confidence: 99%
“…It follows that T is 3-hashing and (3, 1)-separating from Proposition 1. The tetracode was first proved 3-hashing in [23]; combined with the (2, 2)-separation property, this yields the 2-IPP property ( [18]). …”
Section: A Variation On the Tetracodementioning
confidence: 99%