Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,354,873 papers from all fields of science
Search
Sign In
Create Free Account
List of hash functions
Known as:
List of checksum
, List checksum
, List of checksums
Expand
This is a list of hash functions, including cyclic redundancy checks, checksum functions, and cryptographic hash functions.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Adler-32
BLAKE (hash function)
Checksum
Comparison of cryptographic hash functions
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Evolutionary hash functions for specific domains
Y. Sáez
,
C. Estébanez
,
David Quintana
,
P. I. Viñuela
Applied Soft Computing
2019
Corpus ID: 126690990
2018
2018
Experimental Evaluation of Hash Function Performance on Embedded Devices
Matthew Fritter
,
Nadir Ould-Khessal
,
Scott Fazackerley
,
R. Lawrence
Canadian Conference on Electrical and Computer…
2018
Corpus ID: 52151384
With embedded devices collecting, manipulating, and transmitting growing amounts of data in various Internet of Things…
Expand
2016
2016
An Eclipse Plugin to Assist Learners in Selecting Hash Functions
Amogh Mishra
,
K. Kishore
,
Viraj Kumar
International Conference on Technology for…
2016
Corpus ID: 8075880
Hashing is an important technique to achieve high code performance in a variety of data processing applications. The concept is…
Expand
2015
2015
The Power of Evil Choices in Bloom Filters
Thomas Gerbet
,
Amrit Kumar
,
C. Lauradoux
45th Annual IEEE/IFIP International Conference on…
2015
Corpus ID: 17927352
A Bloom filter is a probabilistic hash-based data structure extensively used in software including online security applications…
Expand
2015
2015
Knock Yourself Out: Secure Authentication with Short Re-Usable Passwords
Benjamin Güldenring
,
Volker Roth
,
Lars Ries
Network and Distributed System Security Symposium
2015
Corpus ID: 12998012
—We present Knock Yourself Out (KYO), a password generator that enables secure authentication against a computationally unbounded…
Expand
2015
2015
A Performance Evaluation of Hash Functions for IP Reputation Lookup Using Bloom Filters
Marc Antoine Gosselin-Lavigne
,
Hugo Gonzalez
,
Natalia Stakhanova
,
A. Ghorbani
ARES
2015
Corpus ID: 16126524
IP reputation lookup is one of the traditional methods for recognition of blacklisted IPs, i.e., IP addresses known to be sources…
Expand
2014
2014
Randomness testing of non-cryptographic hash functions for real-time hash table based storage and look-up of URLs
Tahir Ahmad
,
Usman Younis
Journal of Network and Computer Applications
2014
Corpus ID: 206258079
2013
2013
Reducing time cost in hashing operations
F. Breitinger
,
K. Petrov
2013
Corpus ID: 13150922
During a forensic investigation, an investigator might be required to analyze the content of a personal computer. Due to huge…
Expand
2008
2008
Sequence of Hashes Compression in Data De-duplication
Subashini Balachandran
,
C. Constantinescu
Data Compression Conference
2008
Corpus ID: 7103396
Data de-duplication is a simple compression method, popular in storage archival and backup that consists in partitioning large…
Expand
Highly Cited
2007
Highly Cited
2007
RDFSync: Efficient Remote Synchronization of RDF Models
G. Tummarello
,
C. Morbidoni
,
Reto Bachmann-Gmür
,
O. Erling
ISWC/ASWC
2007
Corpus ID: 16939376
In this paper we describe RDFSync, a methodology for efficient synchronization and merging of RDF models. RDFSync is based on…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE