• LSH is a cryptographic hash function designed in 2014 by South Korea to provide integrity in general-purpose software environments such as PCs and smart...
    44 KB (3,102 words) - 23:16, 20 July 2024
  • checksum. Hash function security summary Secure Hash Algorithms NIST hash function competition Key derivation functions (category) "Hash functions". www.azillionmonkeys...
    10 KB (279 words) - 08:17, 17 April 2025
  • In computer science, locality-sensitive hashing (LSH) is a fuzzy hashing technique that hashes similar input items into the same "buckets" with high probability...
    30 KB (4,024 words) - 17:28, 16 April 2025
  • BLAKE is a cryptographic hash function based on Daniel J. Bernstein's ChaCha stream cipher, but a permuted copy of the input block, XORed with round constants...
    30 KB (2,855 words) - 02:58, 11 January 2025
  • Thumbnail for Cryptographic hash function
    A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
    49 KB (6,299 words) - 21:20, 2 April 2025
  • to a spate of "hash flooding" denial-of-service attacks (HashDoS) in late 2011. SipHash is designed as a secure pseudorandom function and can also be...
    14 KB (1,342 words) - 17:18, 17 February 2025
  • In cryptography, N-hash is a cryptographic hash function based on the FEAL round function, and is now considered insecure. It was proposed in 1990 in an...
    2 KB (213 words) - 21:43, 31 December 2023
  • LSH may refer to: LSH (hash function), in cryptography lsh, a UNIX secure shell Locality-sensitive hashing, in algorithms Landing Ship Headquarters, UK...
    642 bytes (95 words) - 01:03, 5 September 2023
  • The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989. The algorithm is optimized for 8-bit computers....
    9 KB (1,053 words) - 04:19, 31 December 2024
  • Thumbnail for Sponge function
    cryptographic primitives, including cryptographic hashes, message authentication codes, mask generation functions, stream ciphers, pseudo-random number generators...
    7 KB (846 words) - 09:04, 19 April 2025
  • MD5 (redirect from MD5 Hash)
    Wikifunctions has a function related to this topic. The MD5 message-digest algorithm is a widely used hash function producing a 128-bit hash value. MD5 was...
    47 KB (4,724 words) - 18:22, 28 April 2025
  • The GOST hash function, defined in the standards GOST R 34.11-94 and GOST 34.311-95 is a 256-bit cryptographic hash function. It was initially defined...
    16 KB (2,206 words) - 02:44, 11 July 2024
  • Thumbnail for HMAC
    type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key. As with any MAC, it may be used to simultaneously...
    18 KB (2,316 words) - 18:51, 16 April 2025
  • Fugue is a cryptographic hash function submitted by IBM to the NIST hash function competition. It was designed by Shai Halevi, William E. Hall, and Charanjit...
    3 KB (651 words) - 10:35, 27 March 2025
  • cryptographic hash function designed by Ross Anderson and Eli Biham in 1995 for efficiency on 64-bit platforms. The size of a Tiger hash value is 192 bits...
    9 KB (910 words) - 14:47, 30 September 2023
  • hash function security/cryptanalysis can be found at hash function security summary. Basic general information about the cryptographic hash functions:...
    16 KB (806 words) - 20:08, 6 August 2024
  • Minhash and SimHash algorithms. In 2007 Google reported using Simhash for duplicate detection for web crawling and using Minhash and LSH for Google News...
    25 KB (3,204 words) - 13:19, 10 March 2025
  • Thumbnail for Hash collision
    derived from a hash function which takes a data input and returns a fixed length of bits. Although hash algorithms, especially cryptographic hash algorithms...
    9 KB (1,142 words) - 10:46, 9 November 2024
  • Thumbnail for Skein (hash function)
    Skein is a cryptographic hash function and one of five finalists in the NIST hash function competition. Entered as a candidate to become the SHA-3 standard...
    9 KB (822 words) - 12:52, 13 April 2025
  • JH is a cryptographic hash function submitted to the NIST hash function competition by Hongjun Wu. Though chosen as one of the five finalists of the competition...
    4 KB (399 words) - 17:35, 7 January 2025
  • cryptography, Whirlpool (sometimes styled WHIRLPOOL) is a cryptographic hash function. It was designed by Vincent Rijmen (co-creator of the Advanced Encryption...
    11 KB (1,054 words) - 03:57, 19 March 2024
  • hash function competition was an open competition held by the US National Institute of Standards and Technology (NIST) to develop a new hash function...
    27 KB (2,244 words) - 20:34, 28 February 2024
  • Lane is a cryptographic hash function submitted to the NIST hash function competition; it was designed by Sebastiaan Indesteege with contributions by...
    744 bytes (74 words) - 21:40, 5 February 2022
  • cryptographic hash functions. Note that not all entries may be up to date. For a summary of other hash function parameters, see comparison of cryptographic hash functions...
    17 KB (1,063 words) - 22:58, 15 March 2025
  • ShangMi 3 (SM3) is a cryptographic hash function, standardised for use in commercial cryptography in China. It was published by the National Cryptography...
    4 KB (335 words) - 01:57, 15 December 2024
  • SHA-2 (category Cryptographic hash functions)
    SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published...
    51 KB (4,982 words) - 17:12, 16 April 2025
  • Yescrypt (category Cryptographic hash functions)
    cryptographic key derivation function function used for password hashing on Fedora Linux, Debian, Ubuntu, and Arch Linux. The function is more resistant to offline...
    2 KB (106 words) - 18:17, 31 March 2025
  • The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S...
    3 KB (464 words) - 07:05, 4 October 2024
  • SIMD is a cryptographic hash function based on the Merkle–Damgård construction submitted to the NIST hash function competition by Gaëtan Leurent. It is...
    1 KB (127 words) - 13:39, 9 February 2023
  • cryptographic hash function, usually for cracking password hashes. Passwords are typically stored not in plain text form, but as hash values. If such...
    24 KB (3,485 words) - 19:40, 2 April 2025