{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:29:45Z","timestamp":1761596985953,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540389903"},{"type":"electronic","value":"9783540389910"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11844297_83","type":"book-chapter","created":{"date-parts":[[2006,10,5]],"date-time":"2006-10-05T18:55:37Z","timestamp":1160074537000},"page":"818-827","source":"Crossref","is-referenced-by-count":13,"title":["Finding State-of-the-Art Non-cryptographic Hashes with Genetic Programming"],"prefix":"10.1007","author":[{"given":"C\u00e9sar","family":"Est\u00e9banez","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Julio C\u00e9sar","family":"Hern\u00e1ndez-Castro","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Arturo","family":"Ribagorda","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pedro","family":"Isasi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"unstructured":"Fowler, noll, vo. fnv hash web page, \nhttp:\/\/www.isthe.com\/chongo\/tech\/comp\/fnv\/","key":"83_CR1"},{"unstructured":"The lil-gp genetic programming system is available at, \nhttp:\/\/garage.cps.msu.edu\/software\/lil-gp\/lilgp-index.html","key":"83_CR2"},{"unstructured":"Berarducci, P., Jordan, D., Martin, D., Seitzer, J.: GEVOSH: Using grammatical evolution to generate hashing functions. In: Poli, R., Cagnoni, S., Keijzer, M., Costa, E., Pereira, F., Raidl, G., Upton, S.C., Goldberg, D., Lipson, H., de Jong, E., Koza, J., Suzuki, H., Sawai, H., Parmee, I., Pelikan, M., Sastry, K., Thierens, D., Stolzmann, W., Lanzi, P.L., Wilson, S.W., O\u2019Neill, M., Ryan, C., Yu, T., Miller, J.F., Garibay, I., Holifield, G., Wu, A.S., Riopka, T., Meysenburg, M.M., Wright, A.W., Richter, N., Moore, J.H., Ritchie, M.D., Davis, L., Roy, R., Jakiela, M. (eds.) GECCO 2004 Workshop Proceedings, Seattle, Washington, USA, June 26-30 (2004)","key":"83_CR3"},{"doi-asserted-by":"crossref","unstructured":"Damiani, E., Liberali, V., Tettamanzi, A.G.B.: Evolutionary design of hashing function circuits using an FPGA, September\u00a017 (1998)","key":"83_CR4","DOI":"10.1007\/BFb0057605"},{"key":"83_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/0-387-34799-2_31","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"R. Forr\u00e9","year":"1990","unstructured":"Forr\u00e9, R.: The strict avalanche criterion: spectral properties of boolean functions and an extended definition. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 450\u2013468. Springer, Heidelberg (1990)"},{"unstructured":"Hinton, G., Sager, D., Upton, M., Boggs, D., Carmean, D., Kyker, A., Roussel, P.: The microarchitecture of the pentium 4 processor. Intel Technology Journal, Q1 (2001), \nhttp:\/\/developer.intel.com\/technology\/itj\/q12001\/articles\/art_2.htm","key":"83_CR6"},{"key":"83_CR7","first-page":"760","volume-title":"Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2000)","author":"D. Hussain","year":"2000","unstructured":"Hussain, D., Malliaris, S.: Evolutionary techniques applied to hashing: An efficient data retrieval method. In: Whitley, D., Goldberg, D., Cantu-Paz, E., Spector, L., Parmee, I., Beyer, H.-G. (eds.) Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2000), Las Vegas, Nevada, July 10-12, 2000, p. 760. Morgan Kaufmann, San Francisco (2000)"},{"unstructured":"Jenkins, B.: A hash function for hash table lookup. Dr. Dobbs Journal (September 1997)","key":"83_CR8"},{"key":"83_CR9","volume-title":"The Art of Computer Programming","author":"D. Knuth","year":"1998","unstructured":"Knuth, D.: The Art of Computer Programming. Addison-Wesley, Reading (1998)"},{"key":"83_CR10","volume-title":"Genetic Programming: On the Programming of Computers by Means of Natural Selection","author":"J.R. Koza","year":"1992","unstructured":"Koza, J.R.: Genetic Programming: On the Programming of Computers by Means of Natural Selection. MIT Press, Cambridge (1992)"},{"doi-asserted-by":"crossref","unstructured":"Matsumoto, Nishimura: Mersenne twister: A 623-dimensionally equidistributed uniform pseudo-random number generator. ACMTMCS: ACM Transactions on Modeling and Computer Simulation\u00a08 (1998)","key":"83_CR11","DOI":"10.1145\/272991.272995"},{"key":"83_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/3-540-60590-8_29","volume-title":"TEA, a tiny encryption algorithm","author":"D.J. Wheeler","year":"1995","unstructured":"Wheeler, D.J., Needham, R.M.: TEA, a tiny encryption algorithm. LNCS, vol.\u00a01008, pp. 363\u2013369. Springer, Heidelberg (1995)"}],"container-title":["Lecture Notes in Computer Science","Parallel Problem Solving from Nature - PPSN IX"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/11844297_83","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T01:18:05Z","timestamp":1664241485000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/11844297_83"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540389903","9783540389910"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11844297_83","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}