• Thumbnail for Hash function
    output. The values returned by a hash function are called hash values, hash codes, (hash/message) digests, or simply hashes. The values are usually used to...
    50 KB (7,455 words) - 10:48, 24 July 2025
  • Thumbnail for Cryptographic hash function
    A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
    49 KB (6,300 words) - 10:48, 24 July 2025
  • Look up hash in Wiktionary, the free dictionary. Hash, hashes, hash mark, or hashing may refer to: Hash (food), a coarse mixture of ingredients, often...
    2 KB (288 words) - 17:32, 5 June 2025
  • Thumbnail for Hash table
    is hashed and the resulting hash indicates where the corresponding value is stored. A map implemented by a hash table is called a hash map. Most hash table...
    54 KB (6,078 words) - 16:13, 17 July 2025
  • Thumbnail for Hash browns
    Hash browns, also spelled hashed browns and hashbrowns, are a popular American breakfast food consisting of finely julienned potatoes that have been fried...
    8 KB (688 words) - 21:53, 26 July 2025
  • Thumbnail for Hash House Harriers
    a Hash or Run, or a Hash Run. A common denominal verb for this activity is Hashing, with participants calling themselves Hashers. Members are referred...
    31 KB (3,927 words) - 13:45, 27 May 2025
  • Thumbnail for Merkle tree
    Merkle tree (redirect from Tiger-Tree Hash)
    the above picture hash 0 is the result of hashing the concatenation of hash 0-0 and hash 0-1. That is, hash 0 = hash( hash 0-0 + hash 0-1 ) where "+" denotes...
    15 KB (1,787 words) - 20:00, 22 July 2025
  • The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S...
    3 KB (464 words) - 07:05, 4 October 2024
  • Number sign (redirect from Hash sign)
    The symbol # is known as the number sign, hash, or (in North America) the pound sign. The symbol has historically been used for a wide range of purposes...
    42 KB (4,332 words) - 22:46, 22 July 2025
  • Thumbnail for HMAC
    cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of...
    18 KB (2,320 words) - 16:34, 18 July 2025
  • Thumbnail for Hash oil
    Hash oil or cannabis oil is an oleoresin obtained by the extraction of cannabis or hashish. It is a cannabis concentrate containing many of its resins...
    35 KB (3,604 words) - 00:20, 12 July 2025
  • Thumbnail for Hash (food)
    Hash is a dish consisting of chopped meat, potatoes, and fried onions. The name is derived from French hacher, meaning 'to chop'. Canned corned beef hash...
    15 KB (1,511 words) - 15:56, 6 July 2025
  • Thumbnail for Hashish
    Hashish (redirect from Finger hash)
    Hashish (/həˈʃiːʃ/ ; from Arabic ḥašiš حشيش 'hay'), usually abbreviated as hash, is a compressed form of resin (trichomes) derived from the cannabis flowers...
    38 KB (4,428 words) - 23:10, 17 July 2025
  • Thumbnail for Hashtag
    Hashtag (redirect from Hash tag)
    A hashtag is a metadata tag operator that is prefaced by the hash symbol, #. On social media, hashtags are used on microblogging and photo-sharing services–especially...
    41 KB (3,909 words) - 07:25, 1 July 2025
  • a checksum. Hash function security summary Secure Hash Algorithms NIST hash function competition Key derivation functions (category) "Hash functions"....
    10 KB (279 words) - 12:52, 24 May 2025
  • Hashcash (redirect from HashCash)
    number with a string several times and hash this new string. It then has to do so over and over until a hash beginning with a certain number of zeros...
    19 KB (2,535 words) - 01:32, 23 July 2025
  • MD5 (redirect from MD5 Hash)
    is a widely used hash function producing a 128-bit hash value. MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function MD4, and...
    46 KB (4,710 words) - 10:55, 16 June 2025
  • Thumbnail for Hash collision
    computer science, a hash collision or hash clash is when two distinct pieces of data in a hash table share the same hash value. The hash value in this case...
    9 KB (1,120 words) - 20:01, 19 June 2025
  • salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend against attacks that...
    13 KB (1,527 words) - 22:35, 14 June 2025
  • Look up hash tree in Wiktionary, the free dictionary. In computer science, hash tree may refer to: Hashed array tree Hash tree (persistent data structure)...
    256 bytes (68 words) - 13:36, 29 April 2017
  • SHA-2 (category Cryptographic hash functions)
    SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published...
    52 KB (4,982 words) - 22:11, 15 July 2025
  • SHA-1 (redirect from SHA-1 hash)
    cryptography, SHA-1 (Secure Hash Algorithm 1) is a hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest...
    50 KB (5,744 words) - 22:35, 2 July 2025
  • The hash join is an example of a join algorithm and is used in the implementation of a relational database management system. All variants of hash join...
    8 KB (1,173 words) - 06:50, 29 July 2024
  • In computer science, hash trie can refer to: Hash tree (persistent data structure), a trie used to map hash values to keys A space-efficient implementation...
    2 KB (222 words) - 22:32, 25 January 2025
  • A hash chain is the successive application of a cryptographic hash function to a piece of data. In computer security, a hash chain is a method used to...
    7 KB (1,005 words) - 23:12, 10 May 2024
  • "Hash Pipe" is a song by American rock band Weezer. Released in 2001, it was the first single off the band's third album Weezer (The Green Album), and...
    13 KB (1,063 words) - 16:53, 13 May 2025
  • [#] (read as "hash") is the second extended play by South Korean girl group Loona. It was released on February 5, 2020, by Blockberry Creative and distributed...
    13 KB (870 words) - 23:50, 26 June 2025
  • In computer science, particularly in functional programming, hash consing is a technique used to share values that are structurally equal. When a value...
    5 KB (530 words) - 20:46, 7 February 2025
  • In computer science, consistent hashing is a special kind of hashing technique such that when a hash table is resized, only n / m {\displaystyle n/m} keys...
    22 KB (2,597 words) - 01:56, 26 May 2025
  • Look up hash house in Wiktionary, the free dictionary. Hash House may refer to: Hash House a go go, a restaurant chain Hash House Bikers, an international...
    426 bytes (101 words) - 20:36, 8 March 2024