Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,154,071 papers from all fields of science
Search
Sign In
Create Free Account
Hash function
Known as:
Hashing algorithm
, Hashing function
, Hashlink
Expand
A hash function is any function that can be used to map data of arbitrary size to data of fixed size. The values returned by a hash function are…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Abstract data type
Artificial intelligence (video games)
Backup
Biological database
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Secure Tag Search in RFID Systems Using Mobile Readers
S. Sundaresan
,
R. Doss
,
S. Piramuthu
,
Wanlei Zhou
IEEE Transactions on Dependable and Secure…
2015
Corpus ID: 16905346
One of the important features of an RFID system is its ability to search for a particular tag among a group of tags. In order to…
Expand
2015
2015
Encryption and hash based security in Internet of Things
B. Vinayaga Sundaram
,
M. Ramnath
,
M. Prasanth
,
J. Varsha Sundaram
3rd International Conference on Signal Processing…
2015
Corpus ID: 15089331
The Internet of Things (IoT) promises to be the next big revolution of the World Wide Web. It has a very wide range of…
Expand
Highly Cited
2011
Highly Cited
2011
Multi-Core LTSmin: Marrying Modularity and Scalability
A. Laarman
,
J. Pol
,
Michael Weber
NASA Formal Methods
2011
Corpus ID: 16315593
The LTSMIN toolset provides multiple generation and on-the-fly analysis algorithms for large graphs (state spaces), typically…
Expand
Highly Cited
2008
Highly Cited
2008
Range queries on structured overlay networks
T. Schütt
,
F. Schintke
,
A. Reinefeld
Computer Communications
2008
Corpus ID: 28875271
Highly Cited
2005
Highly Cited
2005
H.264/AVC video authentication using skipped macroblocks for an erasable watermark
Dima Pröfrock
,
H. Richter
,
M. Schlauweg
,
E. Müller
Visual Communications and Image Processing
2005
Corpus ID: 15826220
This paper presents a new watermarking framework, suitable for authentication of H.264 compressed videos. The authentication data…
Expand
Review
2005
Review
2005
Comparative survey of high-performance cryptographic algorithm implementations on FPGAs
K. Järvinen
,
M. Tommiska
,
J. Skyttä
2005
Corpus ID: 58547414
The authors present a comparative survey of private-key cryptographic algorithm implementations on field programmable gate arrays…
Expand
Highly Cited
2004
Highly Cited
2004
Secure Hashed Diffie-Hellman over Non-DDH Groups
R. Gennaro
,
H. Krawczyk
,
T. Rabin
International Conference on the Theory and…
2004
Corpus ID: 267015
The Diffie-Hellman (DH) transform is a basic cryptographic primitive used in innumerable cryptographic applications, most…
Expand
2003
2003
A case for associative peer to peer overlays
E. Cohen
,
A. Fiat
,
Haim Kaplan
CCRV
2003
Corpus ID: 15848928
The success of a P2P file-sharing network highly depends on the scalability and versatility of its search mechanism. Two…
Expand
Highly Cited
1999
Highly Cited
1999
Licit and Illicit Drug Use in the Netherlands, 1997
P. Cohen
,
M. Abraham
,
R. Til
1999
Corpus ID: 132571741
Niets uit deze uitgave mag worden verveelvoudigd en/of openbaar gemaakt door middel van druk, fotokopie of op welke andere wijze…
Expand
Highly Cited
1988
Highly Cited
1988
PLOP-hashing: A grid file without directory
H. Kriegel
,
B. Seeger
Proceedings. Fourth International Conference on…
1988
Corpus ID: 16365108
The authors consider the case of nonuniform weakly correlated or independent multidimensional record distributions. After…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE