The Toeplitz Hash Algorithm describes hash functions that compute hash values through matrix multiplication of the key with a suitable Toeplitz matrix.[1] The Toeplitz Hash Algorithm is used in many network interface controllers for receive side scaling.[2][3]
As an example, with the Toeplitz matrix T {\displaystyle T} the key k {\displaystyle k} results in a hash h {\displaystyle h} as follows:
where the entries are bits and all operations are modulo 2. In implementations the highly redundant matrix is not necessarily explicitly stored.
This computer-programming-related article is a stub. You can help Wikipedia by expanding it.