Almost optimal hash sequence traversal

52Citations
Citations of this article
47Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We introduce a novel technique for computation of consecutive preimages of hash chains. Whereas traditional techniques have a memory-times-computation complexity of O(n) per output generated, the complexity of our technique is only O(log2 n), where n is the length of the chain. Our solution is based on the same principal amortization principle as [2], and has the saxne asymptotic behavior as this solution. However, our solution decreases the real complexity by approximately a factor of two. Thus, the computational costs of our solution are approximately ½log2 n hash function applications, using only a little more than log2 n storage cells. A result of independent interest is the lower bounds we provide for the optimal (but to us unknown) solution to the problem we study. The bounds show that our proposed solution is very close to optimal. In particular, we show that there exists no improvement on our scheme that reduces the complexity by more than an approximate factor of two.

Cite

CITATION STYLE

APA

Coppersmith, D., & Jakobsson, M. (2003). Almost optimal hash sequence traversal. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2357, pp. 102–119). Springer Verlag. https://doi.org/10.1007/3-540-36504-4_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free