Toeplitz Hash Algorithm: Difference between revisions
Jump to navigation
Jump to search
Fix complaint about missing journal= parameter in {{cite journal}}. TODO: Explain connection between Toeplitz hash and (truncated) cyclic redundancy check |
(No difference)
|
Latest revision as of 03:43, 6 January 2024
Template:Infobox cryptographic hash function
The Toeplitz Hash Algorithm describes hash functions that compute hash values through matrix multiplication of the key with a suitable Toeplitz matrix.[1] The Toeplitz Hash Algorithm is used in many network interface controllers for receive side scaling.[2][3]
As an example, with the Toeplitz matrix the key results in a hash as follows:
where the entries are bits and all operations are modulo 2. In implementations the highly redundant matrix is not necessarily explicitly stored.