• general and technical information for a number of cryptographic hash functions. See the individual functions' articles for further information. This article...
    16 KB (806 words) - 20:08, 6 August 2024
  • Thumbnail for Cryptographic hash function
    A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle n}...
    49 KB (6,299 words) - 21:20, 2 April 2025
  • The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U...
    3 KB (464 words) - 07:05, 4 October 2024
  • against cryptographic hash functions. Note that not all entries may be up to date. For a summary of other hash function parameters, see comparison of cryptographic...
    17 KB (1,063 words) - 22:58, 15 March 2025
  • BLAKE is a cryptographic hash function based on Daniel J. Bernstein's ChaCha stream cipher, but a permuted copy of the input block, XORed with round constants...
    30 KB (2,855 words) - 02:58, 11 January 2025
  • This is a list of hash functions, including cyclic redundancy checks, checksum functions, and cryptographic hash functions. Adler-32 is often mistaken...
    10 KB (279 words) - 08:17, 17 April 2025
  • In cryptography, cryptographic hash functions can be divided into two main categories. In the first category are those functions whose designs are based...
    14 KB (1,823 words) - 18:28, 7 January 2025
  • cryptography, Tiger is a cryptographic hash function designed by Ross Anderson and Eli Biham in 1995 for efficiency on 64-bit platforms. The size of a...
    9 KB (910 words) - 14:47, 30 September 2023
  • MD5 (redirect from MD5 Hash)
    a cryptographic hash function; however it has been found to suffer from extensive vulnerabilities. It remains suitable for other non-cryptographic purposes...
    47 KB (4,724 words) - 18:22, 28 April 2025
  • The Jenkins hash functions are a family of non-cryptographic hash functions for multi-byte keys designed by Bob Jenkins. The first one was formally published...
    7 KB (852 words) - 21:39, 4 May 2024
  • The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989. The algorithm is optimized for 8-bit computers....
    9 KB (1,053 words) - 04:19, 31 December 2024
  • SHA-2 (category Cryptographic hash functions)
    SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published...
    51 KB (4,982 words) - 17:12, 16 April 2025
  • SHA-1 (redirect from SHA-1 hash)
    SHA-1 function. In cryptography, SHA-1 (Secure Hash Algorithm 1) is a hash function which takes an input and produces a 160-bit (20-byte) hash value known...
    50 KB (5,744 words) - 14:18, 17 March 2025
  • Thumbnail for Hash collision
    derived from a hash function which takes a data input and returns a fixed length of bits. Although hash algorithms, especially cryptographic hash algorithms...
    9 KB (1,142 words) - 10:46, 9 November 2024
  • Hash-based cryptography is the generic term for constructions of cryptographic primitives based on the security of hash functions. It is of interest as...
    20 KB (2,329 words) - 22:48, 23 December 2024
  • Thumbnail for Key derivation function
    function (which typically uses a cryptographic hash function or block cipher). KDFs can be used to stretch keys into longer keys or to obtain keys of...
    13 KB (1,640 words) - 18:48, 30 April 2025
  • (SM3) is a cryptographic hash function, standardised for use in commercial cryptography in China. It was published by the National Cryptography Administration...
    4 KB (335 words) - 01:57, 15 December 2024
  • Thumbnail for Sponge function
    cryptographic primitives, including cryptographic hashes, message authentication codes, mask generation functions, stream ciphers, pseudo-random number...
    7 KB (846 words) - 09:04, 19 April 2025
  • In cryptography, security level is a measure of the strength that a cryptographic primitive — such as a cipher or hash function — achieves. Security level...
    13 KB (1,332 words) - 01:56, 12 March 2025
  • filter (application for fast hashes) Cryptographic hash function Hash function Message authentication code List of hash functions Dobraunig, Christoph; Mendel...
    14 KB (1,342 words) - 17:18, 17 February 2025
  • Thumbnail for Merkle tree
    Merkle tree (redirect from Tiger-Tree Hash)
    In cryptography and computer science, a hash tree or Merkle tree is a tree in which every "leaf" node is labelled with the cryptographic hash of a data...
    15 KB (1,790 words) - 06:31, 3 March 2025
  • Thumbnail for HMAC
    code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key. As with any MAC, it...
    18 KB (2,314 words) - 18:51, 16 April 2025
  • Thumbnail for Cryptography
    which a cryptographic hash function is computed, and only the resulting hash is digitally signed. Cryptographic hash functions are functions that take...
    99 KB (10,975 words) - 20:28, 3 April 2025
  • In cryptography, N-hash is a cryptographic hash function based on the FEAL round function, and is now considered insecure. It was proposed in 1990 in an...
    2 KB (213 words) - 21:43, 31 December 2023
  • Thumbnail for MD4
    MD4 (redirect from MD4 hash)
    The MD4 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1990. The digest length is 128 bits. The algorithm has...
    8 KB (871 words) - 18:48, 12 January 2025
  • Thumbnail for RIPEMD
    RIPEMD (category Cryptographic hash functions)
    a RIPEMD-128 function. Wikifunctions has a RIPEMD-160 function. RIPEMD (RIPE Message Digest) is a family of cryptographic hash functions developed in...
    9 KB (869 words) - 19:27, 21 December 2024
  • universal hashing (in a randomized algorithm or data structure) refers to selecting a hash function at random from a family of hash functions with a certain...
    29 KB (4,885 words) - 22:53, 23 December 2024
  • science and cryptography, Whirlpool (sometimes styled WHIRLPOOL) is a cryptographic hash function. It was designed by Vincent Rijmen (co-creator of the Advanced...
    11 KB (1,054 words) - 03:57, 19 March 2024
  • after key stretching) are concatenated and fed to a cryptographic hash function, and the output hash value is then stored with the salt in a database. The...
    13 KB (1,533 words) - 12:18, 19 January 2025
  • Thumbnail for One-way compression function
    compression functions are for instance used in the Merkle–Damgård construction inside cryptographic hash functions. One-way compression functions are often...
    24 KB (3,977 words) - 11:37, 24 March 2025