Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,355,652 papers from all fields of science
Search
Sign In
Create Free Account
List of hash functions
Known as:
List of checksum
, List checksum
, List of checksums
Expand
This is a list of hash functions, including cyclic redundancy checks, checksum functions, and cryptographic hash functions.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Adler-32
BLAKE (hash function)
Checksum
Comparison of cryptographic hash functions
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
An Eclipse Plugin to Assist Learners in Selecting Hash Functions
Amogh Mishra
,
K. Kishore
,
Viraj Kumar
International Conference on Technology for…
2016
Corpus ID: 8075880
Hashing is an important technique to achieve high code performance in a variety of data processing applications. The concept is…
Expand
2016
2016
Evolutionary design of domain specific non-cryptographic hash functions
Marek Kidon
2016
Corpus ID: 36105291
Hash functions are inseparable part of modern computer world. Fast associative arrays so popular among computer programmers for…
Expand
2015
2015
Comparative Analysis of Energy Usage of Hash Functions in Secured Wireless Sensor Networks
Henry Nunoo-Mensah
,
K. Boateng
,
J. Gadze
2015
Corpus ID: 1671033
Security in wireless sensor network (WSN) has become an increasing necessity due to the diverse application areas being…
Expand
2014
2014
Randomness testing of non-cryptographic hash functions for real-time hash table based storage and look-up of URLs
Tahir Ahmad
,
Usman Younis
Journal of Network and Computer Applications
2014
Corpus ID: 206258079
2014
2014
Java evolutionary framework based on genetic programming
J. Karasek
,
Radim Burget
,
M. Dutta
,
Anushikha Singh
SPIN
2014
Corpus ID: 16622678
Automatic optimization techniques, such as evolutionary algorithms, have become popular in the recent years as a general, simple…
Expand
2013
2013
Reducing time cost in hashing operations
F. Breitinger
,
K. Petrov
2013
Corpus ID: 13150922
During a forensic investigation, an investigator might be required to analyze the content of a personal computer. Due to huge…
Expand
2013
2013
Method and apparatus for utilizing the unequal hash function to place the records in unequal access memory
ビーバーソン,アーサー・ジェイ
,
ボーデン,ポール
,
マンジャナサ,ソウミャ
,
ホアン,ジンソン
2013
Corpus ID: 196128266
How to store records in unequal access memory and devices. In various embodiments, the one or more regions of memory, to localize…
Expand
2012
2012
Implementation and Benchmarking of Padding Units and HMAC for SHA-3 Candidates in FPGAs and ASICs
Ambar Vyas
2012
Corpus ID: 58795307
IMPLEMENTATION AND BENCHMARKING OF PADDING UNITS AND HMAC FOR SHA-3 CANDIDATES IN FPGAS AND ASICS Ambarish Vyas, M.S. George…
Expand
2012
2012
Network Packet Inspection to Identify Contraband File Sharing Using Forensic Tools
N. Raja
,
K. Arulanandam
,
R. Somasundaram
2012
Corpus ID: 55223977
This Paper discusses the digital forensic tool that uses a field Programmable Gate Array [FPGA] based software for deep packet…
Expand
2008
2008
Sequence of Hashes Compression in Data De-duplication
Subashini Balachandran
,
C. Constantinescu
Data Compression Conference
2008
Corpus ID: 7103396
Data de-duplication is a simple compression method, popular in storage archival and backup that consists in partitioning large…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE