←back to thread

113 points pseudolus | 1 comments | | HN request time: 0.414s | source
Show context
jasonthorsness ◴[] No.44459044[source]
"Their new algorithm adapts to an adversary’s strategy, but on time scales that it picks randomly"

"Even though many real-world data settings are not adversarial, situations without an adversary can still sometimes involve sudden floods of data to targeted spots, she noted."

This is pretty neat. I bet this will find practical applications.

replies(2): >>44459183 #>>44459434 #
troelsSteegin ◴[] No.44459434[source]
Are "adversaries" broadly used in algorithm design? I've not seen that before. I'm used to edge cases and trying to break things, but an "adversary", especially white box, seems different.
replies(4): >>44459936 #>>44460066 #>>44460159 #>>44461092 #
1. jonstewart ◴[] No.44461092[source]
They are certainly used in anything cryptographic.

Here is a 2011 article about DOS attacks against web apps enable by hash table-based dicts: https://www.securityweek.com/hash-table-collision-attacks-co...

djb has long advocated “crit bit trees”, ie tries: https://cr.yp.to/critbit.html