- Applied mathematics
- >
- Algorithms
- >
- Error detection and correction
- >
- Checksum algorithms

- Applied mathematics
- >
- Theoretical computer science
- >
- Algorithms
- >
- Checksum algorithms

- Discrete mathematics
- >
- Coding theory
- >
- Error detection and correction
- >
- Checksum algorithms

- Fields of mathematics
- >
- Applied mathematics
- >
- Algorithms
- >
- Checksum algorithms

- Fields of mathematics
- >
- Mathematical logic
- >
- Algorithms
- >
- Checksum algorithms

- Information theory
- >
- Coding theory
- >
- Error detection and correction
- >
- Checksum algorithms

- Mathematical logic
- >
- Algorithms
- >
- Error detection and correction
- >
- Checksum algorithms

- Philosophy of mathematics
- >
- Mathematical logic
- >
- Algorithms
- >
- Checksum algorithms

- Statistical theory
- >
- Information theory
- >
- Error detection and correction
- >
- Checksum algorithms

- Theoretical computer science
- >
- Algorithms
- >
- Error detection and correction
- >
- Checksum algorithms

- Theoretical computer science
- >
- Information theory
- >
- Error detection and correction
- >
- Checksum algorithms

Adler-32

Adler-32 is a checksum algorithm written by Mark Adler in 1995, modifying Fletcher's checksum. Compared to a cyclic redundancy check of the same length, it trades reliability for speed (preferring the

ISO 6346

ISO 6346 is an international standard covering the coding, identification and marking of intermodal (shipping) containers used within containerized intermodal freight transport by the International Or

Universal Product Code

The Universal Product Code (UPC or UPC code) is a barcode symbology that is widely used worldwide for tracking trade items in stores. UPC (technically refers to UPC-A) consists of 12 digits that are u

International Bank Account Number

The International Bank Account Number (IBAN) is an internationally agreed system of identifying bank accounts across national borders to facilitate the communication and processing of cross border tra

Luhn algorithm

The Luhn algorithm or Luhn formula, also known as the "modulus 10" or "mod 10" algorithm, named after its creator, IBM scientist Hans Peter Luhn, is a simple checksum formula used to validate a variet

MD5

The MD5 message-digest algorithm is a widely used hash function producing a 128-bit hash value. MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function MD4, and was specified in

International Mobile Equipment Identity

The International Mobile Equipment Identity (IMEI) is a numeric identifier, usually unique, for 3GPP and iDEN mobile phones, as well as some satellite phones. It is usually found printed inside the ba

International Standard Serial Number

An International Standard Serial Number (ISSN) is an eight-digit serial number used to uniquely identify a serial publication, such as a magazine. The ISSN is especially helpful in distinguishing betw

BLAKE (hash function)

BLAKE is a cryptographic hash function based on Daniel J. Bernstein's ChaCha stream cipher, but a permuted copy of the input block, XORed with round constants, is added before each ChaCha round. Like

SYSV checksum

The SYSV checksum algorithm was a commonly used, legacy checksum algorithm.It has been implemented in UNIX System V and is also available through the sum command line utility. This algorithm is useles

Cksum
**cksum** is a command in Unix and Unix-like operating systems that generates a checksum value for a file or stream of data. The cksum command reads each file given in its arguments, or standard in

Luhn mod N algorithm

The Luhn mod N algorithm is an extension to the Luhn algorithm (also known as mod 10 algorithm) that allows it to work with sequences of values in any even-numbered base. This can be useful when a che

Damm algorithm

In error detection, the Damm algorithm is a check digit algorithm that detects all single-digit errors and all adjacent transposition errors. It was presented by H. Michael Damm in 2004.

Checksum

A checksum is a small-sized block of data derived from another block of digital data for the purpose of detecting errors that may have been introduced during its transmission or storage. By themselves

List of hash functions

This is a list of hash functions, including cyclic redundancy checks, checksum functions, and cryptographic hash functions.

SHA-1

In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographically broken but still widely used hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message d

BSD checksum

The BSD checksum algorithm was a commonly used, legacy checksum algorithm. It has been implemented in old BSD and is also available through the sum command line utility. This algorithm is useless from

SHA-2

SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published in 2001. They are built using the Merkle–Damgå

ISO/IEC 7064

ISO/IEC 7064 is a standard promulgated by the International Standards Organization (ISO) and International Electrotechnical Commission (IEC) that defines algorithms for calculating check digit charact

ISBN

The International Standard Book Number (ISBN) is a numeric commercial book identifier that is intended to be unique. Publishers purchase ISBNs from an affiliate of the International ISBN Agency. An IS

SM3 (hash function)

ShangMi 3 (SM3) is a cryptographic hash function used in the Chinese National Standard. It was published by the National Cryptography Administration (Chinese: 国家密码管理局) on 2010-12-17 as "GM/T 0004-2012

Verhoeff algorithm

The Verhoeff algorithm is a checksum formula for error detection developed by the Dutch mathematician Jacobus Verhoeff and was first published in 1969. It was the first decimal check digit algorithm w

List of group-0 ISBN publisher codes

A list of publisher codes for (978) International Standard Book Numbers with a group code of zero.

Fletcher's checksum

The Fletcher checksum is an algorithm for computing a position-dependent checksum devised by John G. Fletcher (1934–2012) at Lawrence Livermore Labs in the late 1970s. The objective of the Fletcher ch

International Standard Music Number

The International Standard Music Number or ISMN (ISO 10957) is a thirteen-character alphanumeric identifier for printed music developed by ISO.

Simple file verification

Simple file verification (SFV) is a file format for storing CRC32 checksums of files to verify the integrity of files. SFV is used to verify that a file has not been corrupted, but it does not otherwi

Message Authenticator Algorithm

The Message Authenticator Algorithm (MAA) was one of the first cryptographic functions for computing a message authentication code (MAC). It was designed in 1983 by Donald Davies and David Clayden at

© 2023 Useful Links.