{"_id":"C3BwczrELsJXNqr2c","bibbaseid":"estbanez-sez-recio-isasi-performanceofthemostcommonnoncryptographichashfunctions-2014","downloads":0,"creationDate":"2019-02-03T11:43:26.920Z","title":"Performance of the most common non-cryptographic hash functions","author_short":["Estébanez, C.","Sáez, Y.","Recio, G.","Isasi, P."],"year":2014,"bibtype":"article","biburl":"https://raw.githubusercontent.com/sa-mooc-uc3m/mooc-research-public/master/trunk/bibtex/KR-EVANNAI.bib","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["César"],"propositions":[],"lastnames":["Estébanez"],"suffixes":[]},{"firstnames":["Yago"],"propositions":[],"lastnames":["Sáez"],"suffixes":[]},{"firstnames":["Gustavo"],"propositions":[],"lastnames":["Recio"],"suffixes":[]},{"firstnames":["Pedro"],"propositions":[],"lastnames":["Isasi"],"suffixes":[]}],"title":"Performance of the most common non-cryptographic hash functions","journal":"Softw., Pract. Exper.","volume":"44","number":"6","pages":"681–698","year":"2014","url":"https://doi.org/10.1002/spe.2179","doi":"10.1002/spe.2179","timestamp":"Thu, 08 Jun 2017 01:00:00 +0200","biburl":"https://dblp.org/rec/bib/journals/spe/EstebanezSRI14","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/spe/EstebanezSRI14,\n author = {C{\\'{e}}sar Est{\\'{e}}banez and\n Yago S{\\'{a}}ez and\n Gustavo Recio and\n Pedro Isasi},\n title = {Performance of the most common non-cryptographic hash functions},\n journal = {Softw., Pract. Exper.},\n volume = {44},\n number = {6},\n pages = {681--698},\n year = {2014},\n url = {https://doi.org/10.1002/spe.2179},\n doi = {10.1002/spe.2179},\n timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},\n biburl = {https://dblp.org/rec/bib/journals/spe/EstebanezSRI14},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Estébanez, C.","Sáez, Y.","Recio, G.","Isasi, P."],"key":"DBLP:journals/spe/EstebanezSRI14","id":"DBLP:journals/spe/EstebanezSRI14","bibbaseid":"estbanez-sez-recio-isasi-performanceofthemostcommonnoncryptographichashfunctions-2014","role":"author","urls":{"Paper":"https://doi.org/10.1002/spe.2179"},"downloads":0,"html":""},"search_terms":["performance","common","non","cryptographic","hash","functions","estébanez","sáez","recio","isasi"],"keywords":[],"authorIDs":[],"dataSources":["2B6J8ki54TjHDxweq"]}