Techniques for representation and
verification of data are disclosed. The techniques are especially useful for representation and
verification of the integrity of data (integrity
verification) in safe computing environments and / or systems (e.g.,
Trusted Computing (TC) systems and / or environments). Multiple independent representative values can be determined independently and possibly in parallel for respective portions of the data. The independent representative values can, for example, be hash values determined at the same time for respective distinct portions of the data. The integrity of the data can be determined based on the multiple hash values by, for example,
processing them to determine a single hash value that can serve as an integrity value. By effectively dividing the data into multiple portions in multiple
processing streams and
processing them in parallel to determine multiple hash values simultaneously, the time required for hashing the data can be reduced in comparison to conventional techniques that operate to determine a hash value for the data as a whole and in a single processing
stream. As a result, the time required for integrity verification can be reduced, thereby allowing safe features to be extended to devices that may operate with relatively
limited resources (e.g., mobile and / or embedded devices) as well as improving the general efficiency of device that are or will be using safety features (e.g.,
Trusted Computing (TC) device).