Publication:
Performance of the most common non-cryptographic hash functions

dc.affiliation.dptoUC3M. Departamento de Informáticaes
dc.affiliation.grupoinvUC3M. Grupo de Investigación: Computación Evolutiva y Redes Neuronales (EVANNAI)es
dc.contributor.authorEstébanez Tascón, César
dc.contributor.authorSáez Achaerandio, Yago
dc.contributor.authorRecio, Gustavo
dc.contributor.authorIsasi, Pedro
dc.date.accessioned2020-08-27T10:02:35Z
dc.date.available2020-08-27T10:02:35Z
dc.date.issued2014-06-01
dc.description.abstractNon-cryptographic hash functions (NCHFs) have an immense number of applications, ranging from compilers and databases to videogames and computer networks. Some of the most important NCHF have been used by major corporations in commercial products. This practical success demonstrates the ability of hashing systems to provide extremely efficient searches over unsorted sets. However, very little research has been devoted to the experimental evaluation of these functions. Therefore, we evaluated the most widely used NCHF using four criteria as follows: collision resistance, distribution of outputs, avalanche effect, and speed. We identified their strengths and weaknesses and found significant flaws in some cases. We also discuss our conclusions regarding general hashing considerations such as selection of the compression map. Our results should assist practitioners and engineers in making more informed choices regarding which function to use for a particular problemen
dc.description.sponsorshipThis work was funded by the Spanish Department of Science and Innovation (Ministerio de Ciencia e Innovación) under the research project Gestión de Movilidad Eficiente y Sostenible (TIN2011‐28336).es
dc.identifier.bibliographicCitationEstébanez, C., Saez, Y., Recio, G. and Isasi, P. (2014), Performance of the most common non‐cryptographic hash functions. Softw. Pract. Exper., 44: 681-698es
dc.identifier.doihttps://doi.org/10.1002/spe.2179
dc.identifier.issn0038-0644
dc.identifier.publicationfirstpage681
dc.identifier.publicationissue6
dc.identifier.publicationlastpage698
dc.identifier.publicationtitleSOFTWARE-PRACTICE & EXPERIENCEen
dc.identifier.publicationvolume44
dc.identifier.urihttps://hdl.handle.net/10016/30764
dc.identifier.uxxiAR/0000015085
dc.language.isoenges
dc.publisherJohn Wiley & Sonsen
dc.relation.projectIDGobierno de España. TIN2011-28336 (MOVES)es
dc.rightsCopyright © 2013 John Wiley & Sons, Ltd.es
dc.rights.accessRightsopen accesses
dc.subject.ecienciaInformáticaes
dc.subject.otherNon-cryptographic hash functionsen
dc.subject.otherAvalanche effecten
dc.subject.otherAvalanche matricesen
dc.subject.otherCollision resistanceen
dc.subject.otherDistribution of outputsen
dc.subject.otherModulo primeen
dc.titlePerformance of the most common non-cryptographic hash functionsen
dc.typeresearch article*
dc.type.hasVersionAM*
dspace.entity.typePublication
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
performance_JSPE_2014_ps.pdf
Size:
1.45 MB
Format:
Adobe Portable Document Format
Description: