Evolutionary hash functions for specific domains
Created by W.Langdon from
gp-bibliography.bib Revision:1.8129
- @Article{SAEZ:2019:ASC,
-
author = "Yago Saez and Cesar Estebanez and David Quintana and
Pedro Isasi",
-
title = "Evolutionary hash functions for specific domains",
-
journal = "Applied Soft Computing",
-
volume = "78",
-
pages = "58--69",
-
year = "2019",
-
keywords = "genetic algorithms, genetic programming, Hash
functions, Evolutionary algorithm, Automated design",
-
ISSN = "1568-4946",
-
DOI = "doi:10.1016/j.asoc.2019.02.014",
-
URL = "http://www.sciencedirect.com/science/article/pii/S1568494619300742",
-
abstract = "Hash functions are a key component of many essential
applications, ranging from compilers, databases or
internet browsers to videogames or network devices. The
same reduced set of functions are extensively used and
have become {"}standard de facto{"} since they provide
very efficient results in searches over unsorted sets.
However, depending on the characteristics of the data
being hashed, the overall performance of these
non-cryptographic hash functions can vary dramatically,
becoming a very common source of performance loss. Hash
functions are difficult to design, they are extremely
non-linear and counter-intuitive, and relationships
among variables are often intricate and obscure.
Surprisingly, very little scientific research is
devoted to the design and experimental assessment of
these widely used functions. In this work, in addition
to performing an up-to-date comparison of
state-of-the-art hash functions, we propose the use of
evolutionary techniques for designing {"}ad hoc{"}
non-cryptographic hash functions. Thus, genetic
programming will be used to automatically design a
tailor-made hash function that can be continuously
evolved if needed, so that it is always adapted to
real-world dynamic environments. To validate the
proposed approach, we have compared several quality
metrics for the generated functions and the most widely
used non-cryptographic hash functions across eight
different scenarios. The results of the evolved hash
functions outperformed those of the non-cryptographic
hash functions in most of the cases tested",
- }
Genetic Programming entries for
Yago Saez
Cesar Estebanez
David Quintana Montero
Pedro Isasi Vinuela
Citations