This is a list of hash functions, including cyclic redundancy checks, checksum functions, and cryptographic hash functions. Adler-32 is often mistaken...
10 KB (279 words) - 12:52, 24 May 2025
A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle n}...
49 KB (6,300 words) - 12:37, 4 July 2025
computer science, a hash collision or hash clash is when two distinct pieces of data in a hash table share the same hash value. The hash value in this case...
9 KB (1,120 words) - 20:01, 19 June 2025
general and technical information for a number of cryptographic hash functions. See the individual functions' articles for further information. This article...
16 KB (806 words) - 04:43, 24 May 2025
A hash function is any function that can be used to map data of arbitrary size to fixed-size values, though there are some hash functions that support...
50 KB (7,455 words) - 07:54, 7 July 2025
Tiger compression function, respectively. Hash function security summary Comparison of cryptographic hash functions List of hash functions Serpent – a block...
9 KB (910 words) - 14:47, 30 September 2023
The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U...
3 KB (464 words) - 07:05, 4 October 2024
cryptographic hash functions. Note that not all entries may be up to date. For a summary of other hash function parameters, see comparison of cryptographic hash functions...
17 KB (1,063 words) - 06:46, 25 May 2025
(sometimes styled WHIRLPOOL) is a cryptographic hash function. It was designed by Vincent Rijmen (co-creator of the Advanced Encryption Standard) and Paulo...
11 KB (1,054 words) - 03:57, 19 March 2024
non-cryptographic hash functions (NCHFs) are hash functions intended for applications that do not need the rigorous security requirements of the cryptographic hash functions...
7 KB (796 words) - 00:45, 28 April 2025
that maps keys to values. A hash table uses a hash function to compute an index, also called a hash code, into an array of buckets or slots, from which...
54 KB (6,078 words) - 16:13, 17 July 2025
SipHash is an add–rotate–xor (ARX) based family of pseudorandom functions created by Jean-Philippe Aumasson and Daniel J. Bernstein in 2012,: 165 in response...
14 KB (1,342 words) - 17:18, 17 February 2025
hash function and one of five finalists in the NIST hash function competition. Entered as a candidate to become the SHA-3 standard, the successor of SHA-1...
9 KB (822 words) - 12:52, 13 April 2025
List of hash may refer to: Hash list List of hash functions This disambiguation page lists articles associated with the title List of hash. If an internal...
96 bytes (45 words) - 19:42, 13 January 2024
The GOST hash function, defined in the standards GOST R 34.11-94 and GOST 34.311-95 is a 256-bit cryptographic hash function. It was initially defined...
16 KB (2,206 words) - 02:44, 11 July 2024
cryptography, cryptographic hash functions can be divided into two main categories. In the first category are those functions whose designs are based on...
14 KB (1,823 words) - 18:28, 7 January 2025
In computer science, a hash list is typically a list of hashes of the data blocks in a file or set of files. Lists of hashes are used for many different...
3 KB (490 words) - 17:39, 17 December 2024
techniques—SM3 cryptographic hash algorithm ISO/IEC 10118-3:2018—IT Security techniques—Hash-functions—Part 3: Dedicated hash-functions IETF RFC draft-sca-cfrg-sm3-02...
4 KB (389 words) - 05:35, 29 June 2025
universal hashing (in a randomized algorithm or data structure) refers to selecting a hash function at random from a family of hash functions with a certain...
29 KB (4,886 words) - 10:51, 16 June 2025
c2 hash ← hash XOR remainingBytes hash ← hash XOR len hash ← hash XOR (hash >> 16) hash ← hash × 0x85ebca6b hash ← hash XOR (hash >> 13) hash ← hash ×...
17 KB (1,413 words) - 01:20, 13 June 2025
the result of a Diffie–Hellman key exchange into a symmetric key for use with AES. Keyed cryptographic hash functions are popular examples of pseudorandom...
13 KB (1,640 words) - 18:48, 30 April 2025
BLAKE is a cryptographic hash function based on Daniel J. Bernstein's ChaCha stream cipher, but a permuted copy of the input block, XORed with round constants...
31 KB (2,941 words) - 12:39, 4 July 2025
The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989. The algorithm is optimized for 8-bit computers....
9 KB (1,053 words) - 04:19, 31 December 2024
Lane is a cryptographic hash function submitted to the NIST hash function competition; it was designed by Sebastiaan Indesteege with contributions by...
744 bytes (74 words) - 21:40, 5 February 2022
compression functions are for instance used in the Merkle–Damgård construction inside cryptographic hash functions. One-way compression functions are often...
24 KB (3,977 words) - 11:37, 24 March 2025
In cryptography, N-hash is a cryptographic hash function based on the FEAL round function, and is now considered insecure. It was proposed in 1990 in an...
2 KB (213 words) - 21:43, 31 December 2023
A hash chain is the successive application of a cryptographic hash function to a piece of data. In computer security, a hash chain is a method used to...
7 KB (1,005 words) - 23:12, 10 May 2024
only hash (ECOH) algorithm was submitted as a candidate for SHA-3 in the NIST hash function competition. However, it was rejected in the beginning of the...
11 KB (1,846 words) - 17:39, 7 January 2025
hash function competition was an open competition held by the US National Institute of Standards and Technology (NIST) to develop a new hash function...
27 KB (2,244 words) - 07:44, 6 June 2025
Hash-based cryptography is the generic term for constructions of cryptographic primitives based on the security of hash functions. It is of interest as...
20 KB (2,329 words) - 03:24, 18 June 2025