1. Mohammad Alahmad and Imad Fakhri Taha Alshaikhli . Broad View of Cryptographic Hash Functions . International Journal of Computer Science Issues , 2013 . Mohammad Alahmad and Imad Fakhri Taha Alshaikhli. Broad View of Cryptographic Hash Functions. International Journal of Computer Science Issues, 2013.
2. A comparison of adaptive radix trees and hash tables
3. Austin Appleby. Murmurhash3 64-bit finalizer. https://code.google.com/p/smhasher/wiki/MurmurHash3. Austin Appleby. Murmurhash3 64-bit finalizer. https://code.google.com/p/smhasher/wiki/MurmurHash3.
4. Austin Appleby . MurmurHash. https://sites.google.com/site/murmurhash/ , 2011 . Austin Appleby. MurmurHash. https://sites.google.com/site/murmurhash/, 2011.
5. Berk Atikoglu , Yuehai Xu , Eitan Frachtenberg , Song Jiang , and Mike Paleczny . Workload Analysis of a Large-Scale Key-Value Store . In Proceedings of the ACM SIGMETRICS/PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems , 2012 . Berk Atikoglu, Yuehai Xu, Eitan Frachtenberg, Song Jiang, and Mike Paleczny. Workload Analysis of a Large-Scale Key-Value Store. In Proceedings of the ACM SIGMETRICS/PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems, 2012.