In cryptography a universal one-way hash function (UOWHF, often pronounced "woof") is a type of universal hash function of particular importance to cryptography...
2 KB (324 words) - 14:32, 6 February 2024
numeric values is still unknown. List of hash functions Universal one-way hash function – type of universal hash function in cryptography proposed as an alternative...
9 KB (1,142 words) - 10:46, 9 November 2024
computing, universal hashing (in a randomized algorithm or data structure) refers to selecting a hash function at random from a family of hash functions with...
29 KB (4,885 words) - 22:53, 23 December 2024
A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
49 KB (6,299 words) - 20:13, 4 May 2025
checksum. Hash function security summary Secure Hash Algorithms NIST hash function competition Key derivation functions (category) "Hash functions". www.azillionmonkeys...
10 KB (279 words) - 08:17, 17 April 2025
information, called the trapdoor, is known. A collision-free hash function f is a one-way function that is also collision-resistant; that is, no randomized...
14 KB (1,956 words) - 16:22, 30 March 2025
attacker. This non-malleability is achieved through the use of a universal one-way hash function and additional computations, resulting in a ciphertext which...
7 KB (1,125 words) - 17:33, 23 July 2024
output. The values returned by a hash function are called hash values, hash codes, (hash/message) digests, or simply hashes. The values are usually used to...
50 KB (7,467 words) - 11:20, 14 April 2025
to compute multiple hash functions, but a related version of MinHash scheme avoids this penalty by using only a single hash function and uses it to select...
25 KB (3,204 words) - 13:19, 10 March 2025
Hash-based cryptography is the generic term for constructions of cryptographic primitives based on the security of hash functions. It is of interest as...
20 KB (2,329 words) - 22:48, 23 December 2024
data type that maps keys to values. A hash table uses a hash function to compute an index, also called a hash code, into an array of buckets or slots...
53 KB (5,944 words) - 17:05, 28 March 2025
Merkle signature scheme (category Hash-based cryptography)
Yung on signature based one-way permutations and functions (and the invention of universal one-way hash functions) gives a way to extend a Merkle-like...
8 KB (1,453 words) - 01:08, 3 March 2025
In computer science, tabulation hashing is a method for constructing universal families of hash functions by combining table lookup with exclusive or...
19 KB (2,762 words) - 13:24, 2 September 2024
A rolling hash (also known as recursive hashing or rolling checksum) is a hash function where the input is hashed in a window that moves through the input...
14 KB (2,011 words) - 17:23, 25 March 2025
Computing, 17(2):281–308, Apr. 1988. Moni Naor, Moti Yung: Universal One-Way Hash Functions and their Cryptographic Applications. STOC 1989: 33–43 "Modern...
45 KB (5,315 words) - 16:52, 11 April 2025
routing and universal hashing to reduce memory contention and network congestion. A finite family F {\displaystyle {\mathcal {F}}} of functions h : M → S...
30 KB (4,024 words) - 17:28, 16 April 2025
org. doi:10.17487/RFC8391. Naor, Moni; Yung, Moti (1989), Universal One-Way Hash Functions and their Cryptographic Applications .STOC, pp. 33–43 Overbeck...
63 KB (6,408 words) - 21:27, 9 April 2025
pseudorandomness or randomness to generate a shared key or seed, and cryptographic hash functions, which can be used to derive a value but are hard to reverse and therefore...
26 KB (3,542 words) - 04:05, 7 February 2025
{\mathcal {S}}\times {\mathcal {X}}\rightarrow \{0,\,1\}^{m}} be a 2-universal hash function. If m ≤ H ∞ ( X ) − 2 log ( 1 ε ) {\textstyle m\leq H_{\infty...
5 KB (588 words) - 06:34, 14 April 2025
Hopscotch hashing is a scheme in computer programming for resolving hash collisions of values of hash functions in a table using open addressing. It is...
7 KB (928 words) - 14:47, 18 December 2024
received the IACR Test of Time Award for his 2009 paper See 1989: Universal one-way hash functions and their cryptographic applications (with M. Naor; ACM’s STOC)...
16 KB (1,628 words) - 09:46, 15 March 2025
Linear probing (category Hashing)
Lookups are performed in the same way, by searching the table sequentially starting at the position given by the hash function, until finding a cell with a...
28 KB (3,605 words) - 19:02, 14 March 2025
Number sign (redirect from Hash sign)
symbol # is known variously in English-speaking regions as the number sign, hash, or pound sign (this last name is rarely found outside North America). The...
42 KB (4,427 words) - 04:34, 4 May 2025
SWIFFT (category Cryptographic hash functions)
provably secure hash functions. It is based on the concept of the fast Fourier transform (FFT). SWIFFT is not the first hash function based on the FFT...
13 KB (1,616 words) - 22:56, 19 October 2024
distance • Universal composability • Universal one-way hash function (UOWHF) Venona project • Verifiable secret sharing • Verisign • Very smooth hash • VEST...
67 KB (2,933 words) - 10:14, 4 January 2025
Cryptography (section Cryptographic hash functions)
a cryptographic hash function is computed, and only the resulting hash is digitally signed. Cryptographic hash functions are functions that take a variable-length...
99 KB (10,975 words) - 20:28, 3 April 2025
Apply (redirect from Apply (higher-order function))
apply. In Lua, apply can be written this way: function apply(f,...) return f(...) end In Perl, arrays, hashes and expressions are automatically "flattened"...
12 KB (1,449 words) - 17:58, 29 March 2025
Hamiltonian path Hamming distance Harter–Highway dragon hash function hash heap hash table hash table delete Hausdorff distance hB-tree head heap heapify...
35 KB (3,135 words) - 15:11, 1 April 2025
constructed by strengthening the ∆-universal hash family MMH using an ϵ-almost strongly universal (ASU) hash function family after the application of ENH...
17 KB (3,335 words) - 12:42, 17 October 2024
Poly1305 (section Use as a one-time authenticator)
Poly1305 is a universal hash family designed by Daniel J. Bernstein in 2002 for use in cryptography. As with any universal hash family, Poly1305 can be...
17 KB (2,513 words) - 19:16, 19 February 2025