Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,232,507 papers from all fields of science
Search
Sign In
Create Free Account
Hash function
Known as:
Hashing algorithm
, Hashing function
, Hashlink
Expand
A hash function is any function that can be used to map data of arbitrary size to data of fixed size. The values returned by a hash function are…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Abstract data type
Artificial intelligence (video games)
Backup
Biological database
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Steganography and Steganalysis of JPEG Images
Mahendra Kumar
2011
Corpus ID: 1311507
My research motivation came from a project supported by Naval Research Laboratory (NRL) where I was working on an algorithm to…
Expand
2010
2010
What Do People Want in Microblogs? Measuring Interestingness of Hashtags in Twitter
J. Weng
,
Ee-Peng Lim
,
Qi He
,
C. Leung
IEEE International Conference on Data Mining
2010
Corpus ID: 17829820
When micro logging becomes a very popular social media, finding interesting posts from high volume stream of user posts is a…
Expand
2010
2010
Fast min-hashing indexing and robust spatio-temporal matching for detecting video copies
Chih-Yi Chiu
,
H. Wang
,
Chu-Song Chen
TOMCCAP
2010
Corpus ID: 11847998
The increase in the number of video copies, both legal and illegal, has become a major problem in the multimedia and Internet era…
Expand
Highly Cited
2008
Highly Cited
2008
The SHAvite-3 Hash Function
E. Biham
,
O. Dunkelman
2008
Corpus ID: 6386607
. In this document we present SHAvite-3, a secure and efficient hash function based on the HAIFA construction and the AES building…
Expand
2008
2008
Public Key Encryption of Images and Videos in Real Time Using Chebyshev Maps
Ganesan Kaliyaperumal
,
Isha Singh
,
Mansi Narain
Fifth International Conference on Computer…
2008
Corpus ID: 17942728
Due to rapid developments in limits and possibilities of communications and information transmissions, there is a growing demand…
Expand
2005
2005
Secure address auto-configuration for mobile ad hoc networks
Pan Wang
,
D. Reeves
,
P. Ning
The Second Annual International Conference on…
2005
Corpus ID: 26841080
Auto-configuration provides convenience in implementing a mobile ad hoc network. However, it may sacrifice network security if…
Expand
2004
2004
Secure routing in a vehicular ad hoc network
Stephan Eichler
,
Florian Dotzert
,
Christian SchwingenschlOgl
,
F. Caro
,
Jorg Eberspacher
IEEE 60th Vehicular Technology Conference, . VTC…
2004
Corpus ID: 2265594
In the presence of attackers reliable and trustworthy operation of mobile ad hoc networks is impossible without secure routing…
Expand
2004
2004
Efficient architecture and hardware implementation of the Whirlpool hash function
P. Kitsos
,
O. Koufopavlou
IEEE transactions on consumer electronics
2004
Corpus ID: 12378309
The latest cryptographical applications demand both high speed and high security. In this paper, an architecture and VLSI…
Expand
1992
1992
Massively Parallel Bayesian Object Recognition
I. Rigoutsos
1992
Corpus ID: 1131331
The problem of model-based object recognition is a fundamental one in the field of computer vision, and represents a promising…
Expand
Highly Cited
1988
Highly Cited
1988
PLOP-hashing: A grid file without directory
H. Kriegel
,
B. Seeger
Proceedings. Fourth International Conference on…
1988
Corpus ID: 16365108
The authors consider the case of nonuniform weakly correlated or independent multidimensional record distributions. After…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required