OurBigBook About$ Donate
 Sign in+ Sign up
by Ciro Santilli (@cirosantilli, 37)

Hash function

 Home Technology Area of technology Information technology Computer Computer science
 1 By others on same topic  0 Discussions  Updated 2025-05-26  +Created 1970-01-01  See my version
Applications:
  • hash map which is a O(1) amortized implementation of a map
  • creating unbreakable chains of data, e.g. for Git commits or Bitcoin.
  • storing passwords on a server in a way that if the password database is stolen, attackers can't reuse them on other websites where the user used the same password: security.blogoverflow.com/2013/09/about-secure-password-hashing/
  • Table of contents
    • Secure Hash Algorithms Hash function
      • SHA-1 Secure Hash Algorithms
      • SHA-2 Secure Hash Algorithms
        • SHA-256 SHA-2
    • Merkle tree Hash function

Secure Hash Algorithms (SHA)

 1  0 
Hash function

SHA-1

 1  0 
Secure Hash Algorithms

SHA-2

 0  0 
Secure Hash Algorithms

SHA-256

 0  0 
SHA-2

Merkle tree

 1  0 
Hash function

 Ancestors (6)

  1. Computer science
  2. Computer
  3. Information technology
  4. Area of technology
  5. Technology
  6.  Home

 Synonyms (1)

  • cirosantilli/hash

 View article source

 Discussion (0)

+ New discussion

There are no discussions about this article yet.

 Articles by others on the same topic (1)

Hash function by Wikipedia Bot 0  1970-01-01
 Read the full article
  See all articles in the same topic + Create my own version
 About$ Donate Content license: CC BY-SA 4.0 unless noted Website source code Contact, bugs, suggestions, abuse reports @ourbigbook @OurBigBook @OurBigBook