• The Jenkins hash functions are a family of non-cryptographic hash functions for multi-byte keys designed by Bob Jenkins. The first one was formally published...
    7 KB (854 words) - 13:58, 4 July 2025
  • checksum. Hash function security summary Secure Hash Algorithms NIST hash function competition Key derivation functions (category) "Hash functions". www.azillionmonkeys...
    10 KB (279 words) - 12:52, 24 May 2025
  • Thumbnail for Perfect hash function
    In computer science, a perfect hash function h for a set S is a hash function that maps distinct elements in S to a set of m integers, with no collisions...
    23 KB (2,908 words) - 00:02, 20 June 2025
  • continuous integration tool Jenkins hash function Jenkins activity survey, a psychological assessment tool Jenkins (drinking game) "Jenkins" (How I Met Your Mother)...
    1 KB (171 words) - 23:16, 30 October 2022
  • non-cryptographic hash functions (NCHFs) are hash functions intended for applications that do not need the rigorous security requirements of the cryptographic hash functions...
    7 KB (796 words) - 00:45, 28 April 2025
  • hash function competition was an open competition held by the US National Institute of Standards and Technology (NIST) to develop a new hash function...
    27 KB (2,244 words) - 07:44, 6 June 2025
  • pseudorandom number generators such as ISAAC and hash functions (Jenkins hash) Short Autobiography of Robert John Jenkins Junior. Accessed on 2009-05-29. 3rd Fast...
    1 KB (102 words) - 16:50, 28 October 2022
  • Thumbnail for Coalesced hashing
    long strings, the following table would be generated (using Bob Jenkins' One-at-a-Time hash algorithm) with a table of size 10: This strategy is effective...
    7 KB (918 words) - 14:13, 18 March 2024
  • Thumbnail for Password
    database, the user is permitted access. The hash value is created by applying a cryptographic hash function to a string consisting of the submitted password...
    79 KB (9,039 words) - 07:22, 14 July 2025
  • other sponge functions, Spritz can be used to build a cryptographic hash function, a deterministic random bit generator (DRBG), an encryption algorithm...
    44 KB (5,055 words) - 11:29, 4 June 2025
  • Thumbnail for Empirical distribution function
    an empirical distribution function (a.k.a. an empirical cumulative distribution function, eCDF) is the distribution function associated with the empirical...
    13 KB (1,514 words) - 06:53, 17 July 2025
  • NetHack for its RNG. Robert J. Jenkins Jr., ISAAC. Fast Software Encryption 1996, pp. 41–49. The ISAAC Cipher Jenkins, Bob (2023-03-17). "Tests for Random...
    5 KB (567 words) - 09:26, 15 May 2025
  • supports a number of different cryptographic algorithms: Cryptographic hash functions MD2, MD4, MD5, RIPEMD160, SHA-1, SHA-2, SHA-3 MAC modes CMAC, HMAC Ciphers...
    11 KB (880 words) - 10:48, 26 January 2024
  • Thumbnail for Lorenz cipher
    codebreaker John Christie: codebreaker John Thompson: codebreaker Roy Jenkins: codebreaker Shaun Wylie: codebreaker Tom Colvill: general manager By the...
    34 KB (3,793 words) - 06:34, 25 May 2025
  • Thumbnail for One-time pad
    has. Universal hashing provides a way to authenticate messages up to an arbitrary security bound (i.e., for any p > 0, a large enough hash ensures that...
    55 KB (7,400 words) - 23:41, 5 July 2025
  • supporting it in hardware), TwoFish, Serpent and Camellia. Cryptographic hash functions A few cryptographically secure pseudorandom number generators do not...
    23 KB (1,461 words) - 21:24, 2 July 2025
  • Thumbnail for Fish (cryptography)
    and senior codebreaker Peter Hilton — codebreaker and mathematician Roy Jenkins — codebreaker and later cabinet minister Victor Masters — shift-leader...
    14 KB (1,477 words) - 20:11, 16 April 2025
  • design for Old Man Jenkins, and the actor John Gegenhuber began to consistently voice him. In the stage musical, Old Man Jenkins stirs up hysteria by...
    93 KB (11,713 words) - 08:39, 6 July 2025
  • ISBN 0-521-79172-3. Reyzin, Leo. (Lecture Notes) Extractors and the Leftover Hash Lemma Distance and Similarity Measures (Wolfram Alpha) Dodge, Y. (2003) Oxford...
    6 KB (643 words) - 02:01, 12 May 2025
  • Thumbnail for YouTube
    Online Audiences". Tubefilter. Archived from the original on March 6, 2014. Jenkins, Brad L. (March 6, 2014). "YouTube Stars Talk Health Care (and Make History)...
    203 KB (18,511 words) - 13:04, 16 July 2025
  • that are securely linked together via cryptographic hashes. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction...
    136 KB (13,228 words) - 21:03, 12 July 2025
  • Manning. ISBN 978-1617295423. Pipeline as Code Continuous Delivery with Jenkins, Kubernetes, and Terraform. Manning. ISBN 9781638350378. Continuous Delivery...
    5 KB (584 words) - 17:10, 20 June 2025
  • Thumbnail for Moving average
    Moving least squares Rising moving average Rolling hash Running total Savitzky–Golay filter Window function Zero lag exponential moving average Hydrologic...
    20 KB (3,170 words) - 08:44, 5 June 2025
  • issue detection. Software programmers and architects should use fitness functions to keep their software in check. Although debated, DevOps is characterized...
    25 KB (2,674 words) - 00:24, 13 July 2025
  • first column of the output. Lines which were not executed are marked with hashes ‘######’. Gcov command line utility supports following options while generating...
    11 KB (1,440 words) - 08:25, 26 December 2024
  • Thumbnail for Cannabis
    plant's principal psychoactive constituent. Compounds such as hashish and hash oil are extracted from the plant. More recently, there has been interest...
    101 KB (10,379 words) - 18:30, 23 June 2025
  • Thumbnail for PostgreSQL
    replication PostgreSQL includes built-in support for regular B-tree and hash table indexes, and four index access methods: generalized search trees (GiST)...
    103 KB (8,676 words) - 19:59, 15 June 2025
  •  %> In Perl % is the sigil for hashes. In many programming languages' string formatting operations (performed by functions such as printf and scanf), the...
    21 KB (2,046 words) - 07:36, 13 July 2025
  • vector machine Least trimmed squares Learning theory (statistics) Leftover hash-lemma Lehmann–Scheffé theorem Length time bias Levene's test Level of analysis...
    87 KB (8,280 words) - 23:04, 12 March 2025
  • Thumbnail for Computation of cyclic redundancy checks
    same CRC algorithm. General category Error correction code List of hash functions Parity is equivalent to a 1-bit CRC with polynomial x+1. Non-CRC checksums...
    58 KB (5,703 words) - 16:54, 20 June 2025