• Hash-based cryptography is the generic term for constructions of cryptographic primitives based on the security of hash functions. It is of interest as...
    20 KB (2,329 words) - 16:22, 27 May 2025
  • In cryptography, N-hash is a cryptographic hash function based on the FEAL round function, and is now considered insecure. It was proposed in 1990 in...
    2 KB (213 words) - 21:43, 31 December 2023
  • Thumbnail for Merkle tree
    Merkle tree (redirect from Tiger-Tree Hash)
    In cryptography and computer science, a hash tree or Merkle tree is a tree in which every "leaf" node is labelled with the cryptographic hash of a data...
    15 KB (1,804 words) - 11:52, 27 May 2025
  • Thumbnail for Cryptographic hash function
    A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
    49 KB (6,299 words) - 15:10, 30 May 2025
  • In computer science and cryptography, Whirlpool (sometimes styled WHIRLPOOL) is a cryptographic hash function. It was designed by Vincent Rijmen (co-creator...
    11 KB (1,054 words) - 03:57, 19 March 2024
  • includes cryptographic systems such as Lamport signatures, the Merkle signature scheme, the XMSS, the SPHINCS, and the WOTS schemes. Hash based digital...
    63 KB (6,408 words) - 18:40, 5 June 2025
  • (SM3) is a cryptographic hash function, standardised for use in commercial cryptography in China. It was published by the National Cryptography Administration...
    4 KB (335 words) - 01:57, 15 December 2024
  • Identity-based cryptography is a type of public-key cryptography in which a publicly known string representing an individual or organization is used as...
    7 KB (868 words) - 15:50, 7 December 2024
  • Thumbnail for Hash collision
    derived from a hash function which takes a data input and returns a fixed length of bits. Although hash algorithms, especially cryptographic hash algorithms...
    9 KB (1,142 words) - 00:48, 10 June 2025
  • In cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend...
    13 KB (1,527 words) - 22:35, 14 June 2025
  • Thumbnail for HMAC
    In cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific...
    18 KB (2,316 words) - 18:51, 16 April 2025
  • In cryptography, Tiger is a cryptographic hash function designed by Ross Anderson and Eli Biham in 1995 for efficiency on 64-bit platforms. The size of...
    9 KB (910 words) - 14:47, 30 September 2023
  • A hash chain is the successive application of a cryptographic hash function to a piece of data. In computer security, a hash chain is a method used to...
    7 KB (1,005 words) - 23:12, 10 May 2024
  • cryptography, cryptographic hash functions can be divided into two main categories. In the first category are those functions whose designs are based...
    14 KB (1,823 words) - 18:28, 7 January 2025
  • tables compare general and technical information for a number of cryptographic hash functions. See the individual functions' articles for further information...
    16 KB (806 words) - 04:43, 24 May 2025
  • MD5 (redirect from MD5 Hash)
    a cryptographic hash function; however it has been found to suffer from extensive vulnerabilities. It remains suitable for other non-cryptographic purposes...
    46 KB (4,710 words) - 03:46, 13 June 2025
  • even faster than universal-hashing based MACs. Additionally, the MAC algorithm can deliberately combine two or more cryptographic primitives, so as to maintain...
    16 KB (1,918 words) - 17:55, 22 January 2025
  • The non-cryptographic hash functions (NCHFs) are hash functions intended for applications that do not need the rigorous security requirements of the cryptographic...
    7 KB (796 words) - 00:45, 28 April 2025
  • In cryptography, a pepper is a secret added to an input such as a password during hashing with a cryptographic hash function. This value differs from a...
    9 KB (1,161 words) - 20:47, 25 May 2025
  • In cryptography, a preimage attack on cryptographic hash functions tries to find a message that has a specific hash value. A cryptographic hash function...
    7 KB (895 words) - 15:44, 13 April 2024
  • The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989. The algorithm is optimized for 8-bit computers. MD2...
    9 KB (1,053 words) - 04:19, 31 December 2024
  • In cryptography and computer security, a length extension attack is a type of attack where an attacker can use Hash(message1) and the length of message1...
    8 KB (1,082 words) - 12:51, 23 April 2025
  • BLAKE is a cryptographic hash function based on Daniel J. Bernstein's ChaCha stream cipher, but a permuted copy of the input block, XORed with round constants...
    31 KB (2,888 words) - 17:05, 21 May 2025
  • Thumbnail for Avalanche effect
    In cryptography, the avalanche effect is the desirable property of cryptographic algorithms, typically block ciphers and cryptographic hash functions,...
    5 KB (568 words) - 14:12, 24 May 2025
  • Thumbnail for Cryptography
    often used, in which a cryptographic hash function is computed, and only the resulting hash is digitally signed. Cryptographic hash functions are functions...
    99 KB (11,007 words) - 11:28, 7 June 2025
  • Interface • Cryptographic hash function • Cryptographic key types • Cryptographic Message Syntax • Cryptographic primitive • Cryptographic protocol • Cryptographic...
    67 KB (2,932 words) - 23:20, 16 May 2025
  • Thumbnail for Digital signature
    Moti Yung: Universal One-Way Hash Functions and their Cryptographic Applications. STOC 1989: 33–43 "Modern Cryptography: Theory & Practice", Wenbo Mao...
    45 KB (5,315 words) - 16:52, 11 April 2025
  • SHA-1 (redirect from SHA-1 hash)
    function. In cryptography, SHA-1 (Secure Hash Algorithm 1) is a hash function which takes an input and produces a 160-bit (20-byte) hash value known as...
    50 KB (5,744 words) - 14:18, 17 March 2025
  • Panama is a cryptographic primitive which can be used both as a hash function and a stream cipher, but its hash function mode of operation has been broken...
    4 KB (352 words) - 12:48, 29 July 2024
  • Thumbnail for Key derivation function
    passphrase using a pseudorandom function (which typically uses a cryptographic hash function or block cipher). KDFs can be used to stretch keys into longer...
    13 KB (1,640 words) - 18:48, 30 April 2025