Search results

Jump to navigation Jump to search
Results 1 – 21 of 411
Advanced search

Search in namespaces:

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • {{short description|Family of cryptographic hash functions}} The '''Secure Hash Algorithms''' are a family of [[cryptographic hash function]]s published by the [[National Institute of Standards and Technology]] (NIS ...
    3 KB (363 words) - 07:05, 4 October 2024
  • * [[Fowler–Noll–Vo hash function]], a non-cryptographic hash function ...
    644 bytes (86 words) - 17:13, 25 February 2025
  • ...st table lookup ([[hash table]]s) and distributed databases ([[distributed hash table]]s). [[Image:Hash list.svg|thumb|350px|right|A hash list with a top hash]] ...
    3 KB (577 words) - 17:39, 17 December 2024
  • {{short description|Fast 8-bit hash function}} '''Pearson hashing''' is a [[non-cryptographic hash function]] designed for fast execution on processors with 8-bit [[processor register ...
    4 KB (575 words) - 17:23, 17 December 2024
  • ...clic redundancy check]]s, [[checksum]] functions, and [[cryptographic hash function]]s. ==Universal hash function families== ...
    10 KB (1,371 words) - 12:52, 24 May 2025
  • ...but are not limited to, [[one-way hash function]]s and [[cipher|encryption function]]s. ...d]]), an encoding routine, such as [[Data Encryption Standard|DES]], and a hash-routine such as [[SHA-1]] can be used in combination. If the attacker does ...
    6 KB (923 words) - 05:08, 24 March 2025
  • * [[Cryptographic hash function]], a special class of hash function that has certain properties which make it suitable for use in cryptography ...
    2 KB (256 words) - 15:17, 20 September 2024
  • {{Short description|Non-cryptographic hash function}} '''Fowler–Noll–Vo''' (or '''FNV''') is a [[non-cryptographic hash function]] created by Glenn Fowler, [[Landon Curt Noll]], and Kiem-Phong Vo<!-- Võ K ...
    15 KB (2,122 words) - 07:00, 23 May 2025
  • ...same MD5 hash, unless they have been specifically created to have the same hash.<ref>{{cite web ...e integrity of files, as virtually any change to a file will cause its MD5 hash to change. Most commonly, {{mono|md5sum}} is used to verify that a file has ...
    5 KB (672 words) - 13:50, 17 January 2025
  • ...non-malleability is achieved through the use of a [[universal one-way hash function]] and additional computations, resulting in a ciphertext which is twice as ...the substitution of some practical function (e.g., a [[cryptographic hash function]]) in place of the random oracle. A growing body of evidence suggests the ...
    7 KB (1,041 words) - 17:33, 23 July 2024
  • ==Other non-cryptographic protocols== Challenge-response protocols are also used in non-cryptographic applications. [[CAPTCHA]]s, for example, are meant to allow websites and ap ...
    11 KB (1,631 words) - 09:38, 23 June 2025
  • ...s, and subsequently probing those tables so that only tuples with the same hash code need to be compared for equality in equijoins. Hash joins are typically more efficient than nested loops joins, except when the ...
    8 KB (1,269 words) - 06:50, 29 July 2024
  • {{Short description|Cryptographic hash function}} ...'Whirlpool''' (sometimes styled '''WHIRLPOOL''') is a [[cryptographic hash function]]. It was designed by [[Vincent Rijmen]] (co-creator of the [[Advanced Enc ...
    11 KB (1,504 words) - 03:57, 19 March 2024
  • *[[MurmurHash]], a non-cryptographic hash function ...
    2 KB (251 words) - 11:30, 14 March 2025
  • ...volves replacing a [[cryptographic hash function]] with a genuinely random function. Another example is the [[generic group model]],<ref>{{ cite conference ...
    5 KB (643 words) - 08:11, 8 September 2024
  • ...unctions]]<br/>[[cryptanalysis]]<br/>[[RIPEMD]]<br />[[One-way compression function#Miyaguchi–Preneel|Miyaguchi-Preneel scheme]] ...ation in computer science, entitled ''Analysis and Design of Cryptographic Hash Functions'', was advised by [[Joos Vandewalle|Joos (Joseph) P. L. Vandewall ...
    12 KB (1,557 words) - 17:42, 26 May 2025
  • ...The passwords are the results of the application of the cryptographic hash function: ...> passwords.<ref>D. Yum, J. Seo, S. Eom, and P. Lee, “Single-Layer Fractal Hash Chain Traversal with Almost Optimal Complexity,” Topics in Cryptology–CT-RS ...
    10 KB (1,475 words) - 18:18, 25 May 2025
  • {{Short description|Random data used as an additional input to a hash function}} ...as an additional input to a [[one-way function]] that [[Cryptographic hash function|hashes]] [[Data (computing)|data]], a [[password]] or [[passphrase]].<ref>{ ...
    13 KB (1,963 words) - 22:35, 14 June 2025
  • ...the hash values of data blocks L1 and L2, respectively, and hash 0 is the hash of the concatenation of hashes 0-0 and 0-1.]] ...ta structure]]. A hash tree is a generalization of a [[hash list]] and a [[hash chain]]. ...
    15 KB (2,259 words) - 16:33, 18 June 2025
  • ...bits. If <math>L > N</math>, only the leftmost <math>N</math> bits of the hash output are used. ...finding the signer's secret key ''x'' or by finding collisions in the hash function <math>H(m) \equiv H(M) \pmod{p-1}</math>. Both problems are believed to be ...
    8 KB (1,200 words) - 23:52, 24 May 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)