Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,982,386 papers from all fields of science
Search
Sign In
Create Free Account
Hash function
Known as:
Hashing algorithm
, Hashing function
, Hashlink
Expand
A hash function is any function that can be used to map data of arbitrary size to data of fixed size. The values returned by a hash function are…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Abstract data type
Artificial intelligence (video games)
Backup
Biological database
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Steganography and Steganalysis of JPEG Images
Mahendra Kumar
2011
Corpus ID: 1311507
My research motivation came from a project supported by Naval Research Laboratory (NRL) where I was working on an algorithm to…
Expand
2010
2010
A Novel Watermarking Scheme for Detecting and Recovering Distortions in Database Tables
Hamed khataeimaragheh
,
H. Rashidi
arXiv.org
2010
Corpus ID: 18378559
In this paper a novel fragile watermarking scheme is proposed to detect, localize and recover malicious modifications in…
Expand
2010
2010
What Do People Want in Microblogs? Measuring Interestingness of Hashtags in Twitter
J. Weng
,
Ee-Peng Lim
,
Qi He
,
C. Leung
IEEE International Conference on Data Mining
2010
Corpus ID: 17829820
When micro logging becomes a very popular social media, finding interesting posts from high volume stream of user posts is a…
Expand
2010
2010
Fast min-hashing indexing and robust spatio-temporal matching for detecting video copies
Chih-Yi Chiu
,
H. Wang
,
Chu-Song Chen
TOMCCAP
2010
Corpus ID: 11847998
The increase in the number of video copies, both legal and illegal, has become a major problem in the multimedia and Internet era…
Expand
Highly Cited
2008
Highly Cited
2008
The SHAvite-3 Hash Function
E. Biham
,
O. Dunkelman
2008
Corpus ID: 6386607
. In this document we present SHAvite-3, a secure and efficient hash function based on the HAIFA construction and the AES building…
Expand
2005
2005
Secure address auto-configuration for mobile ad hoc networks
Pan Wang
,
D. Reeves
,
P. Ning
The Second Annual International Conference on…
2005
Corpus ID: 26841080
Auto-configuration provides convenience in implementing a mobile ad hoc network. However, it may sacrifice network security if…
Expand
2004
2004
Secure routing in a vehicular ad hoc network
Stephan Eichler
,
Florian Dotzert
,
Christian SchwingenschlOgl
,
F. Caro
,
Jorg Eberspacher
IEEE 60th Vehicular Technology Conference, . VTC…
2004
Corpus ID: 2265594
In the presence of attackers reliable and trustworthy operation of mobile ad hoc networks is impossible without secure routing…
Expand
2004
2004
Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters
Wen-Guey Tzeng
IEEE transactions on computers
2004
Corpus ID: 35629278
We propose efficient and secure (string) oblivious transfer (OT/sup 1//sub n/) schemes for any n/spl ges/2. We build our OT/sup 1…
Expand
2004
2004
Efficient architecture and hardware implementation of the Whirlpool hash function
P. Kitsos
,
O. Koufopavlou
IEEE transactions on consumer electronics
2004
Corpus ID: 12378309
The latest cryptographical applications demand both high speed and high security. In this paper, an architecture and VLSI…
Expand
Highly Cited
1988
Highly Cited
1988
PLOP-hashing: A grid file without directory
H. Kriegel
,
B. Seeger
Proceedings. Fourth International Conference on…
1988
Corpus ID: 16365108
The authors consider the case of nonuniform weakly correlated or independent multidimensional record distributions. After…
Expand