A hashfunction is any function that can be used to map data of arbitrary size to fixed-size values, though there are some hashfunctions that support...
general and technical information for a number of cryptographic hashfunctions. See the individual functions' articles for further information. This article...
computer science, a hash collision or hash clash is when two distinct pieces of data in a hash table share the same hash value. The hash value in this case...
A cryptographic hashfunction (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle n}...
cryptographic hashfunctions. Note that not all entries may be up to date. For a summary of other hashfunction parameters, see comparison of cryptographic hash functions...
SipHash is an add–rotate–xor (ARX) based family of pseudorandom functions created by Jean-Philippe Aumasson and Daniel J. Bernstein in 2012,: 165 in response...
The Secure Hash Algorithms are a family of cryptographic hashfunctions published by the National Institute of Standards and Technology (NIST) as a U...
cryptographic hashfunction and a secret cryptographic key. As with any MAC, it may be used to simultaneously verify both the data integrity and authenticity of a...
that maps keys to values. A hash table uses a hashfunction to compute an index, also called a hash code, into an array of buckets or slots, from which...
cryptography, cryptographic hashfunctions can be divided into two main categories. In the first category are those functions whose designs are based on...
universal hashing (in a randomized algorithm or data structure) refers to selecting a hashfunction at random from a family ofhashfunctions with a certain...
the result of a Diffie–Hellman key exchange into a symmetric key for use with AES. Keyed cryptographic hashfunctions are popular examples of pseudorandom...
generalization of a hashlist and a hash chain. Demonstrating that a leaf node is a part of a given binary hash tree requires computing a number ofhashes proportional...
outputs of a cryptographic hashfunction, usually for cracking password hashes. Passwords are typically stored not in plain text form, but as hash values...