
Hashing algorithms, the corner stone in a cryptographer's armory, are used in innumerable real life situations to protect critical information. The hashing function transforms the base information into an incomprehensible form. Such algorithms are also used for data integrity verification using checksums and quick retrieval of objects from a database. Some of the popular hashing algorithms are MD5, SHA-1, 2, 3. A hardware implementation of BLAKE2 is elaborated on, using custom SIMD instructions. These custom SIMD instructions correspond to vital steps in the computation of a BLAKE2 digest. Along with a slew of common arithmetic instructions - they coalesce into a 32-bit processor capable of carrying out BLAKE2 computations.
| citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 1 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
