-
I'm using rust-cuckoofilter to check entries in the 'Have I Been Pwned' master list (551509767 SHA1 hashes).
I've been taking the first 64 bits of the SHA1 hash as the key.
According to [this …
-
# Use-cases for using privacy-aware data-structure are broader than privacy
Privacy is one of the goal of using privacy-aware data structure in information sharing. But there are also other impor…
-
Clients with big filters can demand a lot of RAM on the relay. This can be reduced significantly by using probabilistic filters. While these filters are not great to query a database, they are great t…
-
Thanos currently performs a "possibly in set" check in order to exclude certain StoreAPIs from calls. This check currently only excludes a StoreAPI if all sets of external labels indicate that time-se…
-
Hi,
I wanted to understand the commands associated with the cuckoo filter, apologies some of these question might be very basic.
I am trying to create a filter that would hold 1 billion elements…
-
i am new to cuckoo, i submit some exe file to cuckoo,and there is no dynamic analysis, there is no analysis.log, analysis.conf and logs created by cuckoo, the web just show some static analysis result…
-
Hi @moloch-- !
I saw this project today after reviewing some of your other work. I was wondering if you had considered using a cuckoo filter instead? This structure would support entry deletion, as…
-
Hello
I have a problem I can't solve on Windows 10.
All my files sent from guest to host (screenshots, custom files) are converted from \n to \r\n, even when they are binary. This makes the screensh…
Tigzy updated
4 years ago
-
The current methods for determining [bucket size](https://github.com/bdupras/guava/blob/7150c890691e091bdbfc0d24506e0451b6650bb2/guava/src/com/google/common/hash/CuckooFilter.java#L377-L395) (number o…
-
We cannot always MAC the body because receivers cannot know the packet bodies they receive, only the SURBs they give out.
As a result, there is a 1 bit tagging attack on senders: Our sender's gu…