News
A hash function based on sponge structure with chaotic mapping (SSCM) algorithm is designed for spinal codes to degrade high time complexity. The internal permutation function of the designed hash ...
SHA-1, Secure Hash Algorithm 1, a very popular cryptographic hashing function designed in 1995 by the NSA, is officially dead after a team of researchers from Google and the CWI Institute in Amsterdam ...
Documentation Rust-PHF is a library to generate efficient lookup tables at compile time using perfect hash functions. It currently uses the CHD algorithm and can generate a 100,000 entry map in ...
Audited & minimal JS implementation of hash functions, MACs and KDFs. 🔒 Audited by an independent security firm 🔻 Tree-shakeable: unused code is excluded from your builds 🏎 Fast: hand-optimized for ...
Hashing techniques have been extensively studied in cross-modal retrieval due to their advantages in high computational efficiency and low storage cost. However, existing methods unconsciously ignore ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results