Jump to content

User:TacticX/Books/Hash Functions

From Wikipedia, the free encyclopedia
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.


Hash Functions

Hash function
Collision (computer science)
Collision attack
Cryptographic hash function
Hash table
Rainbow table
CRC Hashing
BSD checksum
Cyclic redundancy check
SYSV checksum
Checksums
Sum (Unix)
Fletcher's checksum
Adler-32
Longitudinal redundancy check
Luhn algorithm
Verhoeff algorithm
Damm algorithm
Non-Cryptographic Hashing
Pearson hashing
Fowler–Noll–Vo hash function
Zobrist hashing
Jenkins hash function
Java hashCode()
MurmurHash
CityHash
Cryptographic Hashing
BLAKE (hash function)
Elliptic curve only hash
Fast Syndrome Based Hash
FORK-256
GOST (hash function)
Grøstl
HAS-160
HAS-V
HAVAL
JH (hash function)
MASH-1
MD2 (cryptography)
MD4
MD5
MD6
MDC-2
N-Hash
Panama (cryptography)
RadioGatún
RIPEMD
SANDstorm hash
SHA-1
SHA-3
Skein (hash function)
SMASH (hash)
SWIFFT
Tiger (cryptography)
Very smooth hash
Whirlpool (cryptography)