• This is a list of hash functions, including cyclic redundancy checks, checksum functions, and cryptographic hash functions. Adler-32 is often mistaken...
    10 KB (279 words) - 12:52, 24 May 2025
  • general and technical information for a number of cryptographic hash functions. See the individual functions' articles for further information. This article...
    16 KB (806 words) - 04:43, 24 May 2025
  • Thumbnail for Hash collision
    computer science, a hash collision or hash clash is when two distinct pieces of data in a hash table share the same hash value. The hash value in this case...
    9 KB (1,120 words) - 20:01, 19 June 2025
  • Thumbnail for Cryptographic hash function
    A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle n}...
    49 KB (6,300 words) - 12:37, 4 July 2025
  • Thumbnail for Hash function
    A hash function is any function that can be used to map data of arbitrary size to fixed-size values, though there are some hash functions that support...
    50 KB (7,455 words) - 07:54, 7 July 2025
  • cryptographic hash functions. Note that not all entries may be up to date. For a summary of other hash function parameters, see comparison of cryptographic hash functions...
    17 KB (1,063 words) - 06:46, 25 May 2025
  • Tiger compression function, respectively. Hash function security summary Comparison of cryptographic hash functions List of hash functions Serpent – a block...
    9 KB (910 words) - 14:47, 30 September 2023
  • The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U...
    3 KB (464 words) - 07:05, 4 October 2024
  • non-cryptographic hash functions (NCHFs) are hash functions intended for applications that do not need the rigorous security requirements of the cryptographic hash functions...
    7 KB (796 words) - 00:45, 28 April 2025
  • (sometimes styled WHIRLPOOL) is a cryptographic hash function. It was designed by Vincent Rijmen (co-creator of the Advanced Encryption Standard) and Paulo...
    11 KB (1,054 words) - 03:57, 19 March 2024
  • The GOST hash function, defined in the standards GOST R 34.11-94 and GOST 34.311-95 is a 256-bit cryptographic hash function. It was initially defined...
    16 KB (2,206 words) - 02:44, 11 July 2024
  • BLAKE is a cryptographic hash function based on Daniel J. Bernstein's ChaCha stream cipher, but a permuted copy of the input block, XORed with round constants...
    31 KB (2,941 words) - 12:39, 4 July 2025
  • Thumbnail for Skein (hash function)
    hash function and one of five finalists in the NIST hash function competition. Entered as a candidate to become the SHA-3 standard, the successor of SHA-1...
    9 KB (822 words) - 12:52, 13 April 2025
  • universal hashing (in a randomized algorithm or data structure) refers to selecting a hash function at random from a family of hash functions with a certain...
    29 KB (4,886 words) - 10:51, 16 June 2025
  • SipHash is an add–rotate–xor (ARX) based family of pseudorandom functions created by Jean-Philippe Aumasson and Daniel J. Bernstein in 2012,: 165  in response...
    14 KB (1,342 words) - 17:18, 17 February 2025
  • techniques—SM3 cryptographic hash algorithm ISO/IEC 10118-3:2018—IT Security techniques—Hash-functions—Part 3: Dedicated hash-functions IETF RFC draft-sca-cfrg-sm3-02...
    4 KB (389 words) - 05:35, 29 June 2025
  • Thumbnail for Hash list
    In computer science, a hash list is typically a list of hashes of the data blocks in a file or set of files. Lists of hashes are used for many different...
    3 KB (490 words) - 17:39, 17 December 2024
  • List of hash may refer to: Hash list List of hash functions This disambiguation page lists articles associated with the title List of hash. If an internal...
    96 bytes (45 words) - 19:42, 13 January 2024
  • cryptography, cryptographic hash functions can be divided into two main categories. In the first category are those functions whose designs are based on...
    14 KB (1,823 words) - 18:28, 7 January 2025
  • Thumbnail for Hash table
    that maps keys to values. A hash table uses a hash function to compute an index, also called a hash code, into an array of buckets or slots, from which...
    54 KB (6,078 words) - 03:50, 19 June 2025
  • c2 hashhash XOR remainingBytes hashhash XOR len hashhash XOR (hash >> 16) hashhash × 0x85ebca6b hashhash XOR (hash >> 13) hashhash ×...
    17 KB (1,413 words) - 01:20, 13 June 2025
  • Thumbnail for Key derivation function
    the result of a Diffie–Hellman key exchange into a symmetric key for use with AES. Keyed cryptographic hash functions are popular examples of pseudorandom...
    13 KB (1,640 words) - 18:48, 30 April 2025
  • Thumbnail for One-way compression function
    compression functions are for instance used in the Merkle–Damgård construction inside cryptographic hash functions. One-way compression functions are often...
    24 KB (3,977 words) - 11:37, 24 March 2025
  • Lane is a cryptographic hash function submitted to the NIST hash function competition; it was designed by Sebastiaan Indesteege with contributions by...
    744 bytes (74 words) - 21:40, 5 February 2022
  • A hash chain is the successive application of a cryptographic hash function to a piece of data. In computer security, a hash chain is a method used to...
    7 KB (1,005 words) - 23:12, 10 May 2024
  • In cryptography, N-hash is a cryptographic hash function based on the FEAL round function, and is now considered insecure. It was proposed in 1990 in an...
    2 KB (213 words) - 21:43, 31 December 2023
  • Standard International Data Encryption Algorithm List of hash functions Comparison of cryptographic hash functions SHA-1 SHA-2 SHA-3 SHA-3 competition RSA (cryptosystem)...
    18 KB (1,725 words) - 19:07, 26 March 2025
  • Hash-based cryptography is the generic term for constructions of cryptographic primitives based on the security of hash functions. It is of interest as...
    20 KB (2,329 words) - 03:24, 18 June 2025
  • Thumbnail for Checksum
    Checksum (redirect from Checksum function)
    functions are related to hash functions, fingerprints, randomization functions, and cryptographic hash functions. However, each of those concepts has different...
    10 KB (1,198 words) - 15:27, 14 June 2025
  • cryptographic hash function submitted to the NIST hash function competition by Hongjun Wu. Though chosen as one of the five finalists of the competition...
    4 KB (399 words) - 17:35, 7 January 2025