About 36,200 results
Open links in new tab
  1. hash - Why can't we reverse hashes? - Cryptography Stack Exchange

    Apr 6, 2017 · A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography. Useful reading - it goes into more detail of the …

  2. What is the fastest stable 128-bit non-cryptographic hash function?

    Feb 23, 2024 · 2 I need a stable 128-bit hash function which is extremely fast since it will be used for generating unique IDs for billions of objects. It doesn't need to be a cryptographic hash function, nor …

  3. hash - What are preimage resistance and collision resistance, and how ...

    How can one exploit the lack? This strongly depends on the use of the hash function in a higher-level protocol (or algorithm build on top of it). In some protocols only the other properties are used directly, …

  4. How to find the 6 main properties of cryptographic hash functions …

    Jan 19, 2022 · A cryptographic hash function should resist attacks on its pre-image. The first 3 I think are pretty easy to adhere to as far as I can imagine so far (not having implemented a cryptographically …

  5. Difference between "one-way function" and "cryptographic hash …

    Jun 19, 2013 · Hmm. Was this question asking about the difference between one-way hash functions and cryptographic hash functions, or general one-way functions and cryptographic hash functions? …

  6. terminology - Does a hash function necessarily need to allow arbitrary ...

    Jan 11, 2021 · A hash function is any function that can be used to map data of arbitrary size to fixed-size values. However, some functions like bcrypt, which label themselves as password hash functions, …

  7. What's the name of the property of ideal cryptographic hash functions ...

    Nov 21, 2023 · I second the : "indistinguishability" (from a "random oracle" or a "random function") is the name of the property thought. Addressing the last question: indistinguishability is typically the …

  8. Cryptographic hash function for 32-bit length input keys

    What I need is a cryptographic hash function that receives a 32-bit length key, and – preferably with basic math operations (addition, shifting, negating, multiplication) – delivers a preferably 32-bit length …

  9. What is the difference between a digest and a hash function?

    Sep 1, 2017 · A hash function is any function that can be used to map data of arbitrary size to data of fixed size. The values returned by a hash function are called hash values, hash codes, digests, or …

  10. implementation - Fast cryptographic hash function for short inputs ...

    Oct 9, 2020 · I am looking for a cryptographic hash function optimized for speed on short inputs, in order to implement a pseudorandom generator with expansion factor 2 (e.g. takes 16 bytes of input and …