Jump to content

Search results

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U...
    3 KB (464 words) - 07:05, 4 October 2024
  • a SHA-1 function. In cryptography, SHA-1 (Secure Hash Algorithm 1) is a hash function which takes an input and produces a 160-bit (20-byte) hash value...
    50 KB (5,744 words) - 14:18, 17 March 2025
  • through the idea of "reusable proof of work" using the 160-bit secure hash algorithm 1 (SHA-1). Proof of work was later popularized by Bitcoin as a foundation...
    37 KB (4,073 words) - 20:11, 27 May 2025
  • as a secure message authentication code (MAC). SipHash, however, is not a general purpose key-less hash function such as Secure Hash Algorithms (SHA)...
    14 KB (1,342 words) - 17:18, 17 February 2025
  • Thumbnail for Double Ratchet Algorithm
    the hash ratchet HMAC. The following is a list of applications that use the Double Ratchet Algorithm or a custom implementation of it: ChatSecure Conversations...
    15 KB (1,391 words) - 09:37, 22 April 2025
  • Thumbnail for Cryptographic hash function
    A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
    49 KB (6,299 words) - 15:10, 30 May 2025
  • SHA-3 hash algorithm. The winning hash function has been published as NIST FIPS 202 the "SHA-3 Standard", to complement FIPS 180-4, the Secure Hash Standard...
    27 KB (2,244 words) - 20:34, 28 February 2024
  • The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989. The algorithm is optimized for 8-bit computers. MD2...
    9 KB (1,053 words) - 04:19, 31 December 2024
  • The algorithm is in the public domain and is in wide use today. It is specified in ISO/IEC 7812-1. It is not intended to be a cryptographically secure hash...
    9 KB (984 words) - 00:22, 30 May 2025
  • concerns with algorithm agility vis-à-vis attacks on hash functions used by SEND expressed in RFC 6273, as CGA currently uses the SHA-1 hash algorithm and PKIX...
    3 KB (327 words) - 13:16, 9 August 2024
  • non-cryptographic hash function created by Glenn Fowler, Landon Curt Noll, and Kiem-Phong Vo. The basis of the FNV hash algorithm was taken from an idea...
    15 KB (1,453 words) - 07:00, 23 May 2025
  • Thumbnail for Magnet URI scheme
    xt=urn:tree:tiger:[ TTH Hash (Base32) ] Secure Hash Algorithm 1 (SHA-1) These hash sums are used on gnutella and G2 (Gnutella2). xt=urn:sha1:[ SHA-1 Hash (Base32) ]...
    20 KB (1,322 words) - 04:39, 21 May 2025
  • hash, keyed hash, message authentication code, or protected checksum. Informally, a message authentication code system consists of three algorithms:...
    16 KB (1,918 words) - 17:55, 22 January 2025
  • Hashrate (redirect from Hash per second)
    cryptographic hashes as a proof-of-work algorithm. Hashrate is a measure of the total computational power of all participating nodes expressed in units of hash calculations...
    3 KB (322 words) - 11:05, 2 June 2025
  • Thumbnail for HMAC
    hash function, such as SHA-2 or SHA-3, may be used in the calculation of an HMAC; the resulting MAC algorithm is termed HMAC-x, where x is the hash function...
    18 KB (2,316 words) - 18:51, 16 April 2025
  • selected for the SHA-3 algorithm. Like SHA-2, BLAKE comes in two variants: one that uses 32-bit words, used for computing hashes up to 256 bits long, and...
    31 KB (2,888 words) - 17:05, 21 May 2025
  • Thumbnail for Skein (hash function)
    Skein Hash Function Family" (PDF). Archived from the original (PDF) on 2014-08-24. Retrieved 2010-12-15. "NIST Selects Winner of Secure Hash Algorithm (SHA-3)...
    9 KB (822 words) - 12:52, 13 April 2025
  • at the end of the message and produce a valid hash without knowing the secret. Algorithms like MD5, SHA-1 and most of SHA-2 that are based on the Merkle–Damgård...
    8 KB (1,082 words) - 12:51, 23 April 2025
  • polynomial time algorithm. A forward-secure PRNG with block length t ( k ) {\displaystyle t(k)} is a PRNG G k : { 0 , 1 } k → { 0 , 1 } k × { 0 , 1 } t ( k )...
    29 KB (3,633 words) - 08:24, 16 April 2025
  • Thumbnail for Hash collision
    from a hash function which takes a data input and returns a fixed length of bits. Although hash algorithms, especially cryptographic hash algorithms, have...
    9 KB (1,142 words) - 10:46, 9 November 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)