No results for "Category:Broken hash functions" (auto) in titles.

Suggestions for article titles:

  1. Hash function: A hash function is any function that can be used to map data of arbitrary size to fixed-size values, though there are some hash functions that support variable length output. The values returned by a hash function are called ... (Mapping arbitrary data to fixed-size values) [100%] 2023-12-11 [Hash functions] [Search algorithms]...
  2. Hash function: A function is considered to be a hash function if it can be used to translate data of arbitrary size to values of a defined size. The values that are generated by a hash function are referred to as hash ... [100%] 2023-12-11 [Hash functions]
  3. Hash (Unix): hash is a command on Unix and Unix-like operating systems that prints the location information for the commands found. The hash command has also been ported to the IBM i operating system. (Unix) [82%] 2023-12-10 [Unix SUS2008 utilities] [IBM i Qshell commands]...
  4. Hash (food): Hash is a dish consisting of chopped meat, potatoes, and fried onions. The name is derived from French: hacher, meaning 'to chop'. (Food) [82%] 2023-12-17 [British cuisine] [Austrian cuisine]...
  5. Hash (Unix): hash is a command on Unix and Unix-like operating systems that prints the location information for the commands found. The hash command has also been ported to the IBM i operating system. (Unix) [82%] 2024-01-26 [Unix SUS2008 utilities] [IBM i Qshell commands]...
  6. Hash (cryptography): In cryptography, a hash or message digest is a fixed-size string calculated from an input text of any size up to some large limit. Hashing a string is a form of One-way encryption and is used by software ... (Cryptography) [82%] 2024-01-26
  7. Hash (cryptography): In cryptography, a hash or message digest is a fixed-size string calculated from an input text of any size up to some large limit. Hashing a string is a form of One-way encryption and is used by software ... (Cryptography) [82%] 2023-06-23
  8. Hash (cooking): In cooking, hash is a broad term for meat dishes in which small pieces of meat are mixed with similarly-sized pieces of potatoes, spices, and other ingredients. The mixture is then fried as a single mass as opposed to ... (Cooking) [82%] 2023-07-08
  9. Jenkins hash function: The Jenkins hash functions are a collection of (non-cryptographic) hash functions for multi-byte keys designed by Bob Jenkins. The first one was formally published in 1997. (Collection of hash functions) [81%] 2023-12-11 [Hash function (non-cryptographic)]
  10. Cryptographic hash function: A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle n} bits) that has special properties desirable for a cryptographic application: Cryptographic hash ... (Hash function that is suitable for use in cryptography) [81%] 2023-12-10 [Cryptographic primitives] [Cryptographic hash functions]...
  11. List of hash functions: This is a list of hash functions, including cyclic redundancy checks, checksum functions, and cryptographic hash functions. Adler-32 is often mistaken for a CRC, but it is not: it is a checksum. (none) [74%] 2023-12-30 [Hash functions] [Checksum algorithms]...
  12. List of hash functions: This is a list of hash functions, including cyclic redundancy checks, checksum functions, and cryptographic hash functions. Adler-32 is often mistaken for a CRC, but it is not: it is a checksum. (none) [74%] 2023-12-10 [Hash functions] [Checksum algorithms]...
  13. Hash function security summary: This article summarizes publicly known attacks against cryptographic hash functions. Note that not all entries may be up to date. (Publicly known attacks against cryptographic hash functions) [70%] 2023-12-10 [Cryptographic hash functions] [Broken hash functions]...
  14. Non-cryptographic hash function: The non-cryptographic hash functions (NCHFs) are hash functions intended for applications that do not need the rigorous security requirements of the cryptographic hash functions (e.g., preimage resistance) and therefore can be faster and less resource-intensive. Typical examples ... [70%] 2024-02-03 [Hash function (non-cryptographic)]
  15. NIST hash function competition: The NIST hash function competition was an open competition held by the US National Institute of Standards and Technology (NIST) to develop a new hash function called SHA-3 to complement the older SHA-1 and SHA-2. The competition ... (Competition to develop SHA-3) [70%] 2023-12-17 [NIST hash function competition] [Cryptographic hash functions]...
  16. Security of cryptographic hash functions: In cryptography, cryptographic hash functions can be divided into two main categories. In the first category are those functions whose designs are based on mathematical problems, and whose security thus follows from rigorous mathematical proofs, complexity theory and formal reduction. (None) [66%] 2023-12-11 [Cryptographic hash functions]
  17. Comparison of cryptographic hash functions: The following tables compare general and technical information for a number of cryptographic hash functions. See the individual functions' articles for further information. (Tables comparing general and technical information for common hashes) [66%] 2023-12-10 [Cryptographic primitives] [Cryptographic hash functions]...
  18. Functions (mathematics): This page is about mathematical functions. For functions in the context of computer programming, see functions. (Mathematics) [66%] 2024-01-03 [Pre-Calculus]
  19. Hush Hush (Alexis Jordan song): "Hush Hush" is a song by American recording artist Alexis Jordan, taken from her self-titled debut album (2011). It was released as the album's third single on June 10, 2011. (Alexis Jordan song) [62%] 2023-03-03 [2011 singles] [Roc Nation singles]...
  20. Hach (surname): Hach is a surname. Notable people with the surname include. (Surname) [62%] 2024-01-21

external From search of external encyclopedias:

0