Jump to content

Search results

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Thumbnail for Hash function
    output. The values returned by a hash function are called hash values, hash codes, (hash/message) digests, or simply hashes. The values are usually used to...
    50 KB (7,467 words) - 03:03, 8 May 2025
  • Thumbnail for Cryptographic hash function
    A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
    49 KB (6,299 words) - 20:13, 4 May 2025
  • Number sign (redirect from Hash sign)
    symbol # is known variously in English-speaking regions as the number sign, hash, or pound sign (this last name is rarely found outside North America). The...
    42 KB (4,427 words) - 04:34, 4 May 2025
  • Thumbnail for Hash table
    is hashed and the resulting hash indicates where the corresponding value is stored. A map implemented by a hash table is called a hash map. Most hash table...
    53 KB (5,944 words) - 17:05, 28 March 2025
  • Thumbnail for Hashtag
    Hashtag (redirect from Hash tag)
    A hashtag is a metadata tag operator that is prefaced by the hash symbol, #. On social media, hashtags are used on microblogging and photo-sharing services–especially...
    41 KB (3,909 words) - 09:35, 8 May 2025
  • SHA-1 (redirect from SHA-1 hash)
    cryptography, SHA-1 (Secure Hash Algorithm 1) is a hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest...
    50 KB (5,744 words) - 14:18, 17 March 2025
  • MD5 (redirect from MD5 Hash)
    is a widely used hash function producing a 128-bit hash value. MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function MD4, and...
    47 KB (4,724 words) - 18:22, 28 April 2025
  • Thumbnail for Merkle tree
    Merkle tree (redirect from Tiger-Tree Hash)
    the above picture hash 0 is the result of hashing the concatenation of hash 0-0 and hash 0-1. That is, hash 0 = hash( hash 0-0 + hash 0-1 ) where "+" denotes...
    15 KB (1,790 words) - 06:31, 3 March 2025
  • Thumbnail for HMAC
    cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of...
    18 KB (2,316 words) - 18:51, 16 April 2025
  • Thumbnail for Cannabis edible
    Cannabis edible (redirect from Hash brownie)
    Effective Methods of Preparing Food and Drink with Marijuana, Hashish, and Hash Oil. Ronin Publishing. ISBN 0-914171-55-0. Drake B (2002). The Marijuana...
    39 KB (3,809 words) - 16:29, 1 February 2025
  • integrity code (MIC), and instead using checksum, error detection code, hash, keyed hash, message authentication code, or protected checksum. Informally, a...
    16 KB (1,918 words) - 17:55, 22 January 2025
  • Thumbnail for Hash browns
    Hash browns, also spelled hashed browns and hashbrowns, are a popular American breakfast food consisting of finely julienned potatoes that have been fried...
    8 KB (688 words) - 04:19, 19 April 2025
  • Thumbnail for Hash oil
    Hash oil or cannabis oil is an oleoresin obtained by the extraction of cannabis or hashish. It is a cannabis concentrate containing many of its resins...
    35 KB (3,586 words) - 03:31, 13 April 2025
  • The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S...
    3 KB (464 words) - 07:05, 4 October 2024
  • Thumbnail for Distributed hash table
    A distributed hash table (DHT) is a distributed system that provides a lookup service similar to a hash table. Key–value pairs are stored in a DHT, and...
    36 KB (4,182 words) - 03:10, 12 April 2025
  • Thumbnail for C Sharp (programming language)
    C# (/ˌsiː ˈʃɑːrp/ see SHARP) is a general-purpose high-level programming language supporting multiple paradigms. C# encompasses static typing,: 4  strong...
    101 KB (8,536 words) - 20:18, 4 May 2025
  • Thumbnail for Key derivation function
    passphrase using a pseudorandom function (which typically uses a cryptographic hash function or block cipher). KDFs can be used to stretch keys into longer keys...
    13 KB (1,640 words) - 18:48, 30 April 2025
  • Associative array (redirect from Hash array)
    associative arrays. The two major solutions to the dictionary problem are hash tables and search trees. It is sometimes also possible to solve the problem...
    24 KB (2,802 words) - 02:21, 23 April 2025
  • cryptography, Whirlpool (sometimes styled WHIRLPOOL) is a cryptographic hash function. It was designed by Vincent Rijmen (co-creator of the Advanced Encryption...
    11 KB (1,054 words) - 03:57, 19 March 2024
  • a checksum. Hash function security summary Secure Hash Algorithms NIST hash function competition Key derivation functions (category) "Hash functions"....
    10 KB (279 words) - 08:17, 17 April 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)