{"id":"https://openalex.org/W157047155","doi":"https://doi.org/10.1007/978-3-319-07536-5_12","title":"All-but-One Dual Projective Hashing and Its Applications","display_name":"All-but-One Dual Projective Hashing and Its Applications","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W157047155","doi":"https://doi.org/10.1007/978-3-319-07536-5_12","mag":"157047155"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-07536-5_12","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-07536-5_12","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016368463","display_name":"Zongyang Zhang","orcid":"https://orcid.org/0000-0003-1358-4933"},"institutions":[{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Zongyang Zhang","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Japan","National Institute of Advanced Industrial Science and Technology (AIST), Japan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Japan","institution_ids":[]},{"raw_affiliation_string":"National Institute of Advanced Industrial Science and Technology (AIST), Japan","institution_ids":["https://openalex.org/I73613424"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100720885","display_name":"Yu Chen","orcid":"https://orcid.org/0000-0002-8931-8079"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Chen","raw_affiliation_strings":["State Key Laboratory of Information Security (SKLOIS), Institute of Information Engineering, Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security (SKLOIS), Institute of Information Engineering, Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067752906","display_name":"Sherman S. M. Chow","orcid":"https://orcid.org/0000-0001-7306-453X"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sherman S. M. Chow","raw_affiliation_strings":["Department of Information Engineering, The Chinese University of Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, The Chinese University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047836988","display_name":"Goichiro Hanaoka","orcid":"https://orcid.org/0000-0001-6617-2962"},"institutions":[{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Goichiro Hanaoka","raw_affiliation_strings":["National Institute of Advanced Industrial Science and Technology (AIST), Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Advanced Industrial Science and Technology (AIST), Japan","institution_ids":["https://openalex.org/I73613424"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023159259","display_name":"Zhenfu Cao","orcid":"https://orcid.org/0000-0002-5250-5030"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhenfu Cao","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Japan","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101712881","display_name":"Yunlei Zhao","orcid":"https://orcid.org/0000-0002-2623-9170"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunlei Zhao","raw_affiliation_strings":["Software School, Fudan University, China"],"affiliations":[{"raw_affiliation_string":"Software School, Fudan University, China","institution_ids":["https://openalex.org/I24943067"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5016368463"],"corresponding_institution_ids":["https://openalex.org/I73613424"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.3624,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.58831632,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"181","last_page":"198"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7111420035362244},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6741170883178711},{"id":"https://openalex.org/keywords/dynamic-perfect-hashing","display_name":"Dynamic perfect hashing","score":0.6623674631118774},{"id":"https://openalex.org/keywords/universal-hashing","display_name":"Universal hashing","score":0.6049182415008545},{"id":"https://openalex.org/keywords/projective-test","display_name":"Projective test","score":0.5940966606140137},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.5678876638412476},{"id":"https://openalex.org/keywords/extension","display_name":"Extension (predicate logic)","score":0.522284984588623},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.5208626389503479},{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.5192780494689941},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5135502815246582},{"id":"https://openalex.org/keywords/k-independent-hashing","display_name":"K-independent hashing","score":0.4359317719936371},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42898452281951904},{"id":"https://openalex.org/keywords/hash-table","display_name":"Hash table","score":0.37185007333755493},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.29259589314460754},{"id":"https://openalex.org/keywords/perfect-hash-function","display_name":"Perfect hash function","score":0.2583073675632477},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.21959123015403748},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1502852737903595},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1380407214164734},{"id":"https://openalex.org/keywords/double-hashing","display_name":"Double hashing","score":0.11802339553833008},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.10497105121612549}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7111420035362244},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6741170883178711},{"id":"https://openalex.org/C122907437","wikidata":"https://www.wikidata.org/wiki/Q5318999","display_name":"Dynamic perfect hashing","level":5,"score":0.6623674631118774},{"id":"https://openalex.org/C116058348","wikidata":"https://www.wikidata.org/wiki/Q846912","display_name":"Universal hashing","level":5,"score":0.6049182415008545},{"id":"https://openalex.org/C177846678","wikidata":"https://www.wikidata.org/wiki/Q1501864","display_name":"Projective test","level":2,"score":0.5940966606140137},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.5678876638412476},{"id":"https://openalex.org/C2778029271","wikidata":"https://www.wikidata.org/wiki/Q5421931","display_name":"Extension (predicate logic)","level":2,"score":0.522284984588623},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.5208626389503479},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.5192780494689941},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5135502815246582},{"id":"https://openalex.org/C187062812","wikidata":"https://www.wikidata.org/wiki/Q6322840","display_name":"K-independent hashing","level":5,"score":0.4359317719936371},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42898452281951904},{"id":"https://openalex.org/C67388219","wikidata":"https://www.wikidata.org/wiki/Q207440","display_name":"Hash table","level":3,"score":0.37185007333755493},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.29259589314460754},{"id":"https://openalex.org/C87431388","wikidata":"https://www.wikidata.org/wiki/Q2070573","display_name":"Perfect hash function","level":4,"score":0.2583073675632477},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.21959123015403748},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1502852737903595},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1380407214164734},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.11802339553833008},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.10497105121612549},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-07536-5_12","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-07536-5_12","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W39687211","https://openalex.org/W124221785","https://openalex.org/W1502927489","https://openalex.org/W1547517307","https://openalex.org/W1601043884","https://openalex.org/W1830579067","https://openalex.org/W1863464715","https://openalex.org/W1972876358","https://openalex.org/W1979280691","https://openalex.org/W2035103883","https://openalex.org/W2038761522","https://openalex.org/W2056489112","https://openalex.org/W2067264567","https://openalex.org/W2096939478","https://openalex.org/W2101022010","https://openalex.org/W2101803085","https://openalex.org/W2110804296","https://openalex.org/W2119718174","https://openalex.org/W2138669153","https://openalex.org/W2153145614","https://openalex.org/W2162670020","https://openalex.org/W2163423973","https://openalex.org/W2165111290","https://openalex.org/W2185608065","https://openalex.org/W2911777915","https://openalex.org/W3021199033","https://openalex.org/W3029076453"],"related_works":["https://openalex.org/W2811247857","https://openalex.org/W4385382899","https://openalex.org/W2094127768","https://openalex.org/W2084899141","https://openalex.org/W2740037903","https://openalex.org/W102859714","https://openalex.org/W3108021595","https://openalex.org/W2044784665","https://openalex.org/W2149143947","https://openalex.org/W1554555624"],"abstract_inverted_index":null,"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
