• In cryptography, the Full Domain Hash (FDH) is an RSA-based signature scheme that follows the hash-and-sign paradigm. It is provably secure (i.e., is...
    2 KB (298 words) - 13:39, 14 August 2023
  • Thumbnail for Hash oil
    Hash oil or cannabis oil is an oleoresin obtained by the extraction of cannabis or hashish. It is a cannabis concentrate containing many of its resins...
    34 KB (3,454 words) - 06:24, 26 September 2024
  • computer science and data mining, MinHash (or the min-wise independent permutations locality sensitive hashing scheme) is a technique for quickly estimating...
    25 KB (3,184 words) - 23:20, 4 December 2023
  • BLAKE is a cryptographic hash function based on Daniel J. Bernstein's ChaCha stream cipher, but a permuted copy of the input block, XORed with round constants...
    30 KB (2,848 words) - 05:59, 18 August 2024
  • Collision attack (redirect from HashDoS)
    a collision attack on a cryptographic hash tries to find two inputs producing the same hash value, i.e. a hash collision. This is in contrast to a preimage...
    17 KB (2,010 words) - 21:48, 17 May 2024
  • NTLM (redirect from NT Hash)
    (X, time, CC2, domain name) v2-Hash = HMAC-MD5(NT-Hash, user name, domain name) LMv2 = HMAC-MD5(v2-Hash, SC, CC) NTv2 = HMAC-MD5(v2-Hash, SC, CC*) response...
    29 KB (3,408 words) - 07:41, 9 October 2024
  • LAN Manager (redirect from LM hash)
    with local accounts except on domain controllers since Windows Vista and later versions no longer maintain the LM hash by default. Kerberos is used in...
    19 KB (1,913 words) - 22:18, 15 September 2024
  • Extendible hashing is a type of hash system which treats a hash as a bit string and uses a trie for bucket lookup. Because of the hierarchical nature of...
    11 KB (1,732 words) - 15:04, 29 May 2024
  • In computer science, locality-sensitive hashing (LSH) is a fuzzy hashing technique that hashes similar input items into the same "buckets" with high probability...
    30 KB (4,013 words) - 13:50, 25 June 2024
  • SHA-3 (category Cryptographic hash functions)
    SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. Although part...
    52 KB (5,712 words) - 05:04, 9 October 2024