• Thumbnail for Hash function
    output. The values returned by a hash function are called hash values, hash codes, (hash/message) digests, or simply hashes. The values are usually used to...
    50 KB (7,455 words) - 10:48, 24 July 2025
  • Thumbnail for Cryptographic hash function
    A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
    49 KB (6,300 words) - 10:48, 24 July 2025
  • Look up hash in Wiktionary, the free dictionary. Hash, hashes, hash mark, or hashing may refer to: Hash (food), a coarse mixture of ingredients, often...
    2 KB (336 words) - 19:13, 29 July 2025
  • Thumbnail for Hash table
    is hashed and the resulting hash indicates where the corresponding value is stored. A map implemented by a hash table is called a hash map. Most hash table...
    54 KB (6,078 words) - 16:13, 17 July 2025
  • Thumbnail for Hash browns
    Hash browns, also spelled hashed browns and hashbrowns, are a popular American breakfast food consisting of finely julienned potatoes that have been fried...
    8 KB (688 words) - 21:53, 26 July 2025
  • Thumbnail for Hash House Harriers
    a Hash or Run, or a Hash Run. A common denominal verb for this activity is Hashing, with participants calling themselves Hashers. Members are referred...
    31 KB (3,927 words) - 13:45, 27 May 2025
  • The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S...
    3 KB (464 words) - 07:05, 4 October 2024
  • Number sign (redirect from Hash sign)
    The symbol # is known as the number sign, hash, or (in North America) the pound sign. The symbol has historically been used for a wide range of purposes...
    42 KB (4,332 words) - 22:46, 22 July 2025
  • Thumbnail for HMAC
    cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of...
    18 KB (2,328 words) - 10:10, 29 July 2025
  • Thumbnail for Merkle tree
    Merkle tree (redirect from Tiger-Tree Hash)
    the above picture hash 0 is the result of hashing the concatenation of hash 0-0 and hash 0-1. That is, hash 0 = hash( hash 0-0 + hash 0-1 ) where "+" denotes...
    15 KB (1,787 words) - 20:00, 22 July 2025
  • Look up hash house in Wiktionary, the free dictionary. Hash House may refer to: hash-house; see Glossary of early twentieth century slang in the United...
    867 bytes (169 words) - 19:25, 29 July 2025
  • Thumbnail for Hash oil
    Hash oil or cannabis oil is an oleoresin obtained by the extraction of cannabis or hashish. It is a cannabis concentrate containing many of its resins...
    35 KB (3,604 words) - 00:20, 12 July 2025
  • Thumbnail for Hash (food)
    Hash is a dish consisting of chopped meat, potatoes, and fried onions. The name is derived from French hacher, meaning 'to chop'. Canned corned beef hash...
    15 KB (1,511 words) - 15:56, 6 July 2025
  • Thumbnail for Hashtag
    Hashtag (redirect from Hash tag)
    A hashtag is a metadata tag operator that is prefaced by the hash symbol, #. On social media, hashtags are used on microblogging and photo-sharing services–especially...
    41 KB (3,909 words) - 19:07, 29 July 2025
  • Thumbnail for Hashish
    Hashish (redirect from Finger hash)
    Hashish (/həˈʃiːʃ/ ; from Arabic ḥašiš حشيش 'hay'), usually abbreviated as hash, is a compressed form of resin (trichomes) derived from the cannabis flowers...
    38 KB (4,428 words) - 23:10, 17 July 2025
  • MD5 (redirect from MD5 Hash)
    is a widely used hash function producing a 128-bit hash value. MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function MD4, and...
    46 KB (4,710 words) - 10:55, 16 June 2025
  • Hashcash (redirect from HashCash)
    number with a string several times and hash this new string. It then has to do so over and over until a hash beginning with a certain number of zeros...
    19 KB (2,535 words) - 01:32, 23 July 2025
  • a checksum. Hash function security summary Secure Hash Algorithms NIST hash function competition Key derivation functions (category) "Hash functions"....
    10 KB (279 words) - 12:52, 24 May 2025
  • Thumbnail for Hash collision
    computer science, a hash collision or hash clash is when two distinct pieces of data in a hash table share the same hash value. The hash value in this case...
    9 KB (1,120 words) - 20:01, 19 June 2025
  • salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend against attacks that...
    13 KB (1,527 words) - 22:35, 14 June 2025
  • Look up hash tree in Wiktionary, the free dictionary. In computer science, hash tree may refer to: Hashed array tree Hash tree (persistent data structure)...
    256 bytes (68 words) - 13:36, 29 April 2017
  • SHA-2 (category Cryptographic hash functions)
    SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published...
    52 KB (4,982 words) - 22:11, 15 July 2025
  • [#] (read as "hash") is the second extended play by South Korean girl group Loona. It was released on February 5, 2020, by Blockberry Creative and distributed...
    13 KB (870 words) - 23:50, 26 June 2025
  • In computer science, hash trie can refer to: Hash tree (persistent data structure), a trie used to map hash values to keys A space-efficient implementation...
    2 KB (222 words) - 22:32, 25 January 2025
  • SHA-1 (redirect from SHA-1 hash)
    cryptography, SHA-1 (Secure Hash Algorithm 1) is a hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest...
    50 KB (5,744 words) - 22:35, 2 July 2025
  • "Hash Pipe" is a song by American rock band Weezer. Released in 2001, it was the first single off the band's third album Weezer (The Green Album), and...
    13 KB (1,063 words) - 16:53, 13 May 2025
  • A hash chain is the successive application of a cryptographic hash function to a piece of data. In computer security, a hash chain is a method used to...
    7 KB (1,005 words) - 23:12, 10 May 2024
  • The hash join is an example of a join algorithm and is used in the implementation of a relational database management system. All variants of hash join...
    8 KB (1,173 words) - 06:50, 29 July 2024
  • In computer science, consistent hashing is a special kind of hashing technique such that when a hash table is resized, only n / m {\displaystyle n/m} keys...
    22 KB (2,597 words) - 01:56, 26 May 2025
  • Associative array (redirect from Hash array)
    associative arrays. The two major solutions to the dictionary problem are hash tables and search trees. It is sometimes also possible to solve the problem...
    24 KB (2,802 words) - 02:21, 23 April 2025