Jump to content

User:TacticX/Books/Hash Functions

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by TacticX (talk | contribs) at 12:10, 28 November 2014 (Created page with '{{saved book |title= |subtitle= |cover-image= |cover-color= | setting-papersize = a4 | setting-toc = auto | setting-columns = 2 }} == Hash Functions == :...'). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)


Hash Functions

Hash function
Collision (computer science)
Collision attack
Cryptographic hash function
Hash table
Rainbow table
CRC Hashing
BSD checksum
Cyclic redundancy check
SYSV checksum
Checksums
Sum (Unix)
Fletcher's checksum
Adler-32
Longitudinal redundancy check
Luhn algorithm
Verhoeff algorithm
Damm algorithm
Non-Cryptographic Hashing
Pearson hashing
Fowler–Noll–Vo hash function
Zobrist hashing
Jenkins hash function
Java hashCode()
MurmurHash
CityHash
Cryptographic Hashing
BLAKE (hash function)
Elliptic curve only hash
Fast Syndrome Based Hash
FORK-256
GOST (hash function)
Grøstl
HAS-160
HAS-V
HAVAL
JH (hash function)
MASH-1
MD2 (cryptography)
MD4
MD5
MD6
MDC-2
N-Hash
Panama (cryptography)
RadioGatún
RIPEMD
SANDstorm hash
SHA-1
SHA-2
SHA-3
Skein (hash function)
SMASH (hash)
SWIFFT
Tiger (cryptography)
Very smooth hash
Whirlpool (cryptography)