• Thumbnail for Hash list
    In computer science, a hash list is typically a list of hashes of the data blocks in a file or set of files. Lists of hashes are used for many different...
    3 KB (490 words) - 17:39, 17 December 2024
  • This is a list of hash functions, including cyclic redundancy checks, checksum functions, and cryptographic hash functions. Adler-32 is often mistaken...
    10 KB (279 words) - 12:52, 24 May 2025
  • Distributed hash table Double hashing Dynamic perfect hash table Hash array mapped trie Hash list Hash table Hash tree Hash trie Koorde Prefix hash tree Rolling...
    9 KB (914 words) - 05:55, 20 March 2025
  • Thumbnail for Merkle tree
    Merkle tree (redirect from Tiger-Tree Hash)
    generalization of a hash list and a hash chain. Demonstrating that a leaf node is a part of a given binary hash tree requires computing a number of hashes proportional...
    15 KB (1,804 words) - 11:52, 27 May 2025
  • A hash calendar is a data structure that is used to measure the passage of time by adding hash values to an append-only database with one hash value per...
    5 KB (621 words) - 16:45, 8 June 2024
  • A hash chain is the successive application of a cryptographic hash function to a piece of data. In computer security, a hash chain is a method used to...
    7 KB (1,005 words) - 23:12, 10 May 2024
  • Thumbnail for Hash table
    is hashed and the resulting hash indicates where the corresponding value is stored. A map implemented by a hash table is called a hash map. Most hash table...
    53 KB (5,966 words) - 16:19, 24 May 2025
  • Thumbnail for Hash function
    output. The values returned by a hash function are called hash values, hash codes, (hash/message) digests, or simply hashes. The values are usually used to...
    50 KB (7,455 words) - 21:00, 27 May 2025
  • Thumbnail for Cryptographic hash function
    A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
    49 KB (6,299 words) - 15:10, 30 May 2025
  • Thumbnail for Hash collision
    computer science, a hash collision or hash clash is when two distinct pieces of data in a hash table share the same hash value. The hash value in this case...
    9 KB (1,142 words) - 10:46, 9 November 2024
  • List of hash may refer to: Hash list List of hash functions This disambiguation page lists articles associated with the title List of hash. If an internal...
    96 bytes (45 words) - 19:42, 13 January 2024
  • Thumbnail for Hash (food)
    Hash is a dish consisting of chopped meat, potatoes, and fried onions. The name is derived from French hacher, meaning 'to chop'. Canned corned beef hash...
    15 KB (1,511 words) - 16:51, 15 May 2025
  • c2 hashhash XOR remainingBytes hashhash XOR len hashhash XOR (hash >> 16) hashhash × 0x85ebca6b hashhash XOR (hash >> 13) hashhash ×...
    17 KB (1,406 words) - 23:48, 6 March 2025
  • 256 KiB = 262,144 B. pieces—a hash list, i.e., a concatenation of each piece's SHA-1 hash. As SHA-1 returns a 160-bit hash, pieces will be a string whose...
    18 KB (2,303 words) - 02:41, 12 May 2025
  • MD5 (redirect from MD5 Hash)
    is a widely used hash function producing a 128-bit hash value. MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function MD4, and...
    46 KB (4,710 words) - 09:01, 30 May 2025
  • Thumbnail for Key derivation function
    passphrase using a pseudorandom function (which typically uses a cryptographic hash function or block cipher). KDFs can be used to stretch keys into longer keys...
    13 KB (1,640 words) - 18:48, 30 April 2025
  • computing, universal hashing (in a randomized algorithm or data structure) refers to selecting a hash function at random from a family of hash functions with...
    29 KB (4,908 words) - 13:54, 20 May 2025
  • Thumbnail for HMAC
    cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of...
    18 KB (2,316 words) - 18:51, 16 April 2025
  • Hashcash (redirect from Hash cash)
    number with a string several times and hash this new string. It then has to do so over and over until a hash beginning with a certain number of zeros...
    19 KB (2,548 words) - 14:03, 28 May 2025
  • and hashing the result. In cryptographic terms, the list of MD4 checksums is a hash list, and the file identification checksum is the root hash, also...
    19 KB (2,262 words) - 06:45, 23 April 2025
  • Thumbnail for Digest access authentication
    Digest access authentication (category CS1 maint: multiple names: authors list)
    of hashing, making it non-secure unless used in conjunction with TLS. Technically, digest authentication is an application of cryptographic hashing with...
    25 KB (2,879 words) - 04:06, 25 May 2025
  • Collision attack (redirect from HashDoS)
    a collision attack on a cryptographic hash tries to find two inputs producing the same hash value, i.e. a hash collision. This is in contrast to a preimage...
    17 KB (2,041 words) - 08:16, 19 February 2025
  • Number sign (redirect from Hash sign)
    The symbol # is known as the number sign, hash, or pound sign (only "hash" is used outside North America). The symbol has historically been used for a...
    41 KB (4,280 words) - 22:12, 27 May 2025
  • Ed2k URI scheme (redirect from Ed2k (hash))
    modifications. This method of hashing allows the recipient to verify that a hash list corresponds to an original eD2k file hash, without the need to actually...
    7 KB (958 words) - 18:06, 3 March 2025
  • Rainbow table (category Cryptographic hash functions)
    cryptographic hash function, usually for cracking password hashes. Passwords are typically stored not in plain text form, but as hash values. If such...
    24 KB (3,485 words) - 02:42, 26 May 2025
  • 2012,: 165  in response to a spate of "hash flooding" denial-of-service attacks (HashDoS) in late 2011. SipHash is designed as a secure pseudorandom function...
    14 KB (1,342 words) - 17:18, 17 February 2025
  • Lamport signature (category Hash-based cryptography)
    from any cryptographically secure one-way function; usually a cryptographic hash function is used. Although the potential development of quantum computers...
    13 KB (2,017 words) - 21:47, 26 November 2024
  • Associative array (redirect from Hash array)
    associative arrays. The two major solutions to the dictionary problem are hash tables and search trees. It is sometimes also possible to solve the problem...
    24 KB (2,802 words) - 02:21, 23 April 2025
  • Thumbnail for Rabbit Hash, Kentucky
    Rabbit Hash is an unincorporated community and census-designated place (CDP) in Boone County, Kentucky, United States. The population was 254 at the 2020...
    19 KB (1,655 words) - 13:26, 21 November 2024
  • Thumbnail for Distributed hash table
    A distributed hash table (DHT) is a distributed system that provides a lookup service similar to a hash table. Key–value pairs are stored in a DHT, and...
    36 KB (4,182 words) - 03:10, 12 April 2025