In computer science, a hash list is typically a list of hashes of the data blocks in a file or set of files. Lists of hashes are used for many different...
3 KB (490 words) - 17:39, 17 December 2024
This is a list of hash functions, including cyclic redundancy checks, checksum functions, and cryptographic hash functions. Adler-32 is often mistaken...
10 KB (279 words) - 12:52, 24 May 2025
Distributed hash table Double hashing Dynamic perfect hash table Hash array mapped trie Hash list Hash table Hash tree Hash trie Koorde Prefix hash tree Rolling...
9 KB (914 words) - 05:55, 20 March 2025
Merkle tree (redirect from Tiger-Tree Hash)
generalization of a hash list and a hash chain. Demonstrating that a leaf node is a part of a given binary hash tree requires computing a number of hashes proportional...
15 KB (1,804 words) - 11:52, 27 May 2025
A hash calendar is a data structure that is used to measure the passage of time by adding hash values to an append-only database with one hash value per...
5 KB (621 words) - 16:45, 8 June 2024
A hash chain is the successive application of a cryptographic hash function to a piece of data. In computer security, a hash chain is a method used to...
7 KB (1,005 words) - 23:12, 10 May 2024
is hashed and the resulting hash indicates where the corresponding value is stored. A map implemented by a hash table is called a hash map. Most hash table...
53 KB (5,966 words) - 16:19, 24 May 2025
output. The values returned by a hash function are called hash values, hash codes, (hash/message) digests, or simply hashes. The values are usually used to...
50 KB (7,455 words) - 21:00, 27 May 2025
A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
49 KB (6,299 words) - 15:10, 30 May 2025
computer science, a hash collision or hash clash is when two distinct pieces of data in a hash table share the same hash value. The hash value in this case...
9 KB (1,142 words) - 10:46, 9 November 2024
List of hash may refer to: Hash list List of hash functions This disambiguation page lists articles associated with the title List of hash. If an internal...
96 bytes (45 words) - 19:42, 13 January 2024
Hash is a dish consisting of chopped meat, potatoes, and fried onions. The name is derived from French hacher, meaning 'to chop'. Canned corned beef hash...
15 KB (1,511 words) - 16:51, 15 May 2025
c2 hash ← hash XOR remainingBytes hash ← hash XOR len hash ← hash XOR (hash >> 16) hash ← hash × 0x85ebca6b hash ← hash XOR (hash >> 13) hash ← hash ×...
17 KB (1,406 words) - 23:48, 6 March 2025
Torrent file (section Distributed hash tables)
256 KiB = 262,144 B. pieces—a hash list, i.e., a concatenation of each piece's SHA-1 hash. As SHA-1 returns a 160-bit hash, pieces will be a string whose...
18 KB (2,303 words) - 02:41, 12 May 2025
Key derivation function (redirect from Password hash)
passphrase using a pseudorandom function (which typically uses a cryptographic hash function or block cipher). KDFs can be used to stretch keys into longer keys...
13 KB (1,640 words) - 18:48, 30 April 2025
computing, universal hashing (in a randomized algorithm or data structure) refers to selecting a hash function at random from a family of hash functions with...
29 KB (4,908 words) - 13:54, 20 May 2025
HMAC (redirect from Keyed-Hashing Message Authentication)
cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of...
18 KB (2,316 words) - 18:51, 16 April 2025
EDonkey network (section Hash identification)
and hashing the result. In cryptographic terms, the list of MD4 checksums is a hash list, and the file identification checksum is the root hash, also...
19 KB (2,262 words) - 06:45, 23 April 2025
Digest access authentication (category CS1 maint: multiple names: authors list)
of hashing, making it non-secure unless used in conjunction with TLS. Technically, digest authentication is an application of cryptographic hashing with...
25 KB (2,879 words) - 04:06, 25 May 2025
Collision attack (redirect from HashDoS)
a collision attack on a cryptographic hash tries to find two inputs producing the same hash value, i.e. a hash collision. This is in contrast to a preimage...
17 KB (2,041 words) - 08:16, 19 February 2025
Number sign (redirect from Hash sign)
The symbol # is known as the number sign, hash, or pound sign (only "hash" is used outside North America). The symbol has historically been used for a...
41 KB (4,280 words) - 22:12, 27 May 2025
Ed2k URI scheme (redirect from Ed2k (hash))
modifications. This method of hashing allows the recipient to verify that a hash list corresponds to an original eD2k file hash, without the need to actually...
7 KB (958 words) - 18:06, 3 March 2025
Rainbow table (category Cryptographic hash functions)
cryptographic hash function, usually for cracking password hashes. Passwords are typically stored not in plain text form, but as hash values. If such...
24 KB (3,485 words) - 02:42, 26 May 2025
2012,: 165 in response to a spate of "hash flooding" denial-of-service attacks (HashDoS) in late 2011. SipHash is designed as a secure pseudorandom function...
14 KB (1,342 words) - 17:18, 17 February 2025
Lamport signature (category Hash-based cryptography)
from any cryptographically secure one-way function; usually a cryptographic hash function is used. Although the potential development of quantum computers...
13 KB (2,017 words) - 21:47, 26 November 2024
Associative array (redirect from Hash array)
associative arrays. The two major solutions to the dictionary problem are hash tables and search trees. It is sometimes also possible to solve the problem...
24 KB (2,802 words) - 02:21, 23 April 2025
Rabbit Hash is an unincorporated community and census-designated place (CDP) in Boone County, Kentucky, United States. The population was 254 at the 2020...
19 KB (1,655 words) - 13:26, 21 November 2024
A distributed hash table (DHT) is a distributed system that provides a lookup service similar to a hash table. Key–value pairs are stored in a DHT, and...
36 KB (4,182 words) - 03:10, 12 April 2025