Skip to search formSkip to main contentSkip to account menu

List of hash functions

Known as: List of checksum, List checksum, List of checksums 
This is a list of hash functions, including cyclic redundancy checks, checksum functions, and cryptographic hash functions.
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Hashing is an important technique to achieve high code performance in a variety of data processing applications. The concept is… 
2016
2016
Hash functions are inseparable part of modern computer world. Fast associative arrays so popular among computer programmers for… 
2015
2015
Security in wireless sensor network (WSN) has become an increasing necessity due to the diverse application areas being… 
2014
2014
Automatic optimization techniques, such as evolutionary algorithms, have become popular in the recent years as a general, simple… 
2013
2013
During a forensic investigation, an investigator might be required to analyze the content of a personal computer. Due to huge… 
2013
2013
How to store records in unequal access memory and devices. In various embodiments, the one or more regions of memory, to localize… 
2012
2012
IMPLEMENTATION AND BENCHMARKING OF PADDING UNITS AND HMAC FOR SHA-3 CANDIDATES IN FPGAS AND ASICS Ambarish Vyas, M.S. George… 
2012
2012
This Paper discusses the digital forensic tool that uses a field Programmable Gate Array [FPGA] based software for deep packet… 
2008
2008
Data de-duplication is a simple compression method, popular in storage archival and backup that consists in partitioning large…