In computer science and cryptography, Whirlpool (sometimes styled WHIRLPOOL) is a cryptographic hash function. It was designed by Vincent Rijmen (co-creator...
11 KB (1,054 words) - 03:57, 19 March 2024
BLAKE is a cryptographic hash function based on Daniel J. Bernstein's ChaCha stream cipher, but a permuted copy of the input block, XORed with round constants...
31 KB (2,888 words) - 17:05, 21 May 2025
A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
49 KB (6,299 words) - 15:10, 30 May 2025
checksum. Hash function security summary Secure Hash Algorithms NIST hash function competition Key derivation functions (category) "Hash functions". www.azillionmonkeys...
10 KB (279 words) - 12:52, 24 May 2025
Whirlpool tub, a bathtub Whirlpool Corporation, a household appliance manufacturer Whirlpool (hash function), a cryptographic hash function Whirlpool...
2 KB (285 words) - 09:06, 15 December 2023
In cryptography, N-hash is a cryptographic hash function based on the FEAL round function, and is now considered insecure. It was proposed in 1990 in an...
2 KB (213 words) - 21:43, 31 December 2023
HMAC (redirect from Keyed-Hashing Message Authentication)
type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key. As with any MAC, it may be used to simultaneously...
18 KB (2,316 words) - 18:51, 16 April 2025
to a spate of "hash flooding" denial-of-service attacks (HashDoS) in late 2011. SipHash is designed as a secure pseudorandom function and can also be...
14 KB (1,342 words) - 17:18, 17 February 2025
Streebog (category Cryptographic hash functions)
hash function defined in the Russian national standard GOST R 34.11-2012 Information Technology – Cryptographic Information Security – Hash Function....
8 KB (854 words) - 13:12, 25 May 2025
The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S...
3 KB (464 words) - 07:05, 4 October 2024
derived from a hash function which takes a data input and returns a fixed length of bits. Although hash algorithms, especially cryptographic hash algorithms...
9 KB (1,142 words) - 00:48, 10 June 2025
The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989. The algorithm is optimized for 8-bit computers....
9 KB (1,053 words) - 04:19, 31 December 2024
Merkle tree (redirect from Tiger-Tree Hash)
the above picture hash 0 is the result of hashing the concatenation of hash 0-0 and hash 0-1. That is, hash 0 = hash( hash 0-0 + hash 0-1 ) where "+" denotes...
15 KB (1,804 words) - 11:52, 27 May 2025
cryptographic hash function designed by Ross Anderson and Eli Biham in 1995 for efficiency on 64-bit platforms. The size of a Tiger hash value is 192 bits...
9 KB (910 words) - 14:47, 30 September 2023
JH is a cryptographic hash function submitted to the NIST hash function competition by Hongjun Wu. Though chosen as one of the five finalists of the competition...
4 KB (399 words) - 17:35, 7 January 2025
Argon2 (category Cryptographic hash functions)
Argon2 is a key derivation function that was selected as the winner of the 2015 Password Hashing Competition. It was designed by Alex Biryukov, Daniel...
14 KB (1,491 words) - 04:51, 31 March 2025
SHA-1 (redirect from SHA-1 hash)
SHA-1 function. In cryptography, SHA-1 (Secure Hash Algorithm 1) is a hash function which takes an input and produces a 160-bit (20-byte) hash value known...
50 KB (5,744 words) - 14:18, 17 March 2025
MD6 (category NIST hash function competition)
Algorithm is a cryptographic hash function. It uses a Merkle tree-like structure to allow for immense parallel computation of hashes for very long inputs. Authors...
6 KB (497 words) - 10:36, 22 May 2025
cryptographic hash functions. Note that not all entries may be up to date. For a summary of other hash function parameters, see comparison of cryptographic hash functions...
17 KB (1,063 words) - 06:46, 25 May 2025
Rebound attack (section Detailed description of the attack on hash functions with AES-like compression functions)
Attack can be used against the hash function Whirlpool to find collisions on variants where the compression function (the AES-like block cipher, W) is...
14 KB (1,939 words) - 19:32, 23 September 2020
hash function security/cryptanalysis can be found at hash function security summary. Basic general information about the cryptographic hash functions:...
16 KB (806 words) - 04:43, 24 May 2025
Salt (cryptography) (redirect from Salted hash)
cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend against attacks...
13 KB (1,527 words) - 22:35, 14 June 2025
block cipher into a hash function, used eg. in the hash function Whirlpool. He is one of the authors of the RIPEMD-160 hash function. He was also a co-inventor...
12 KB (975 words) - 17:42, 26 May 2025
construction can be used to build one-way compression functions. Whirlpool — A cryptographic hash function built using the Miyaguchi–Preneel construction and...
24 KB (3,977 words) - 11:37, 24 March 2025
In cryptography, the fast syndrome-based hash functions (FSB) are a family of cryptographic hash functions introduced in 2003 by Daniel Augot, Matthieu...
19 KB (2,941 words) - 09:27, 9 June 2025
Bcrypt (category Cryptographic hash functions)
bcrypt is a password-hashing function designed by Niels Provos and David Mazières. It is based on the Blowfish cipher and presented at USENIX in 1999....
27 KB (2,863 words) - 11:19, 24 May 2025
LSH is a cryptographic hash function designed in 2014 by South Korea to provide integrity in general-purpose software environments such as PCs and smart...
44 KB (3,102 words) - 23:16, 20 July 2024
SHA-3 (category NIST hash function competition)
function, not (yet) standardized by NIST, including a stream cipher, an authenticated encryption system, a "tree" hashing scheme for faster hashing on...
52 KB (5,726 words) - 19:03, 2 June 2025
SIMD is a cryptographic hash function based on the Merkle–Damgård construction submitted to the NIST hash function competition by Gaëtan Leurent. It is...
1 KB (127 words) - 13:39, 9 February 2023