About 50 results
Open links in new tab
  1. hash - Why can't we reverse hashes? - Cryptography Stack Exchange

    Apr 6, 2017 · A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography. Useful reading - it goes into more detail of the …

  2. Difference between hash function - Cryptography Stack Exchange

    Dec 11, 2018 · In some paper, the terms "cryptographic hash function" and "deterministic hash function" would appear? I'm wondering what's their difference, and are there some other types of hash …

  3. How to find the 6 main properties of cryptographic hash functions …

    Jan 19, 2022 · A cryptographic hash function should resist attacks on its pre-image. The first 3 I think are pretty easy to adhere to as far as I can imagine so far (not having implemented a cryptographically …

  4. Difference between "one-way function" and "cryptographic hash …

    Jun 19, 2013 · Hmm. Was this question asking about the difference between one-way hash functions and cryptographic hash functions, or general one-way functions and cryptographic hash functions? …

  5. What is the fastest stable 128-bit non-cryptographic hash function?

    Feb 23, 2024 · 2 I need a stable 128-bit hash function which is extremely fast since it will be used for generating unique IDs for billions of objects. It doesn't need to be a cryptographic hash function, nor …

  6. hash - What are preimage resistance and collision resistance, and how ...

    How can one exploit the lack? This strongly depends on the use of the hash function in a higher-level protocol (or algorithm build on top of it). In some protocols only the other properties are used directly, …

  7. What is a cryptographic "salt"? - Cryptography Stack Exchange

    Can you help me understand what a cryptographic “salt” is? In the context of password creation, a "salt" is data (random or otherwise) added to a hash function in order to make the hashed output of a …

  8. terminology - Does a hash function necessarily need to allow arbitrary ...

    Jan 11, 2021 · A cryptographic hash function is a kind of hash function that has some additional security-related properties. Like in the general case, the input doesn't have to be the set of all bit …

  9. Can we use a Cryptographic hash function to generate infinite random ...

    Dec 12, 2019 · A cryptographic hash function can be used to generate (pseudo-) random bits of an apparent quality comparable to dedicated random number generators. I say "apparent" because …

  10. What is the difference between a digest and a hash function?

    Sep 1, 2017 · A hash function is any function that can be used to map data of arbitrary size to data of fixed size. The values returned by a hash function are called hash values, hash codes, digests, or …