Skip to search formSkip to main contentSkip to account menu

List of hash functions

Known as: List of checksum, List checksum, List of checksums 
This is a list of hash functions, including cyclic redundancy checks, checksum functions, and cryptographic hash functions.
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
With embedded devices collecting, manipulating, and transmitting growing amounts of data in various Internet of Things… 
2016
2016
Hashing is an important technique to achieve high code performance in a variety of data processing applications. The concept is… 
2015
2015
A Bloom filter is a probabilistic hash-based data structure extensively used in software including online security applications… 
2015
2015
—We present Knock Yourself Out (KYO), a password generator that enables secure authentication against a computationally unbounded… 
2015
2015
IP reputation lookup is one of the traditional methods for recognition of blacklisted IPs, i.e., IP addresses known to be sources… 
2013
2013
During a forensic investigation, an investigator might be required to analyze the content of a personal computer. Due to huge… 
2008
2008
Data de-duplication is a simple compression method, popular in storage archival and backup that consists in partitioning large… 
Highly Cited
2007
Highly Cited
2007
In this paper we describe RDFSync, a methodology for efficient synchronization and merging of RDF models. RDFSync is based on…