Data processing hash algorithm and policy management

作者: Mark L. Buer

DOI:

关键词: Theoretical computer scienceDynamic perfect hashingHash treeSHA-2Computer scienceSecure Hash AlgorithmHash chainDouble hashingHash functionHash buster

摘要: Methods and associated systems for processing data are disclosed. A hashing function sequentially processes a hash key to generate value. policy management system packets according defined policies.

参考文章(12)
Yao-Tzung Wang, Jin-Ru Chen, Lookup engine for network devices ,(2000)
Suresh Krishna, Christopher Owen, Phillip Norman Smith, Joseph J. Tardo, Derrick C. Lin, Patrick Law, Classification engine in a cryptography acceleration chip ,(2000)
J.Lawrence Carter, Mark N. Wegman, Universal classes of hash functions Journal of Computer and System Sciences. ,vol. 18, pp. 143- 154 ,(1979) , 10.1016/0022-0000(79)90044-8
Jun Xu, M. Singhal, J. Degroat, A novel cache architecture to support layer-four packet classification at memory access speeds international conference on computer communications. ,vol. 3, pp. 1445- 1454 ,(2000) , 10.1109/INFCOM.2000.832542
M.V. Ramakrishna, G.A. Portice, Perfect hashing functions for hardware applications international conference on data engineering. pp. 464- 470 ,(1991) , 10.1109/ICDE.1991.131495
M.V. Ramakrishna, E. Fu, E. Bahcekapili, Efficient hardware hashing functions for high performance computers IEEE Transactions on Computers. ,vol. 46, pp. 1378- 1381 ,(1997) , 10.1109/12.641938
Jun Xu, M. Singhal, Cost-effective flow table designs for high-speed routers: architecture and performance evaluation IEEE Transactions on Computers. ,vol. 51, pp. 1089- 1099 ,(2002) , 10.1109/TC.2002.1032627