Examples of using Hash functions in English and their translations into Portuguese
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Official/political
Faster preimage attacks can be found by cryptanalysing certain hash functions, and are specific to that function. .
For instance, in August 2004 collisions were found in several then-popular hash functions, including MD5.
For instance, in August 2004 weaknesses were found in several then-popular hash functions, including SHA-0,
SHA-0 and other hash functions.
The ciphers in hash functions are built for hashing:
Some hash functions, such as Skein,
the standard was updated in FIPS PUB 180-4, adding the hash functions SHA-512/224 and SHA-512/256, and describing a method for generating initial values for truncated versions of SHA-512.
where the first is constructed from a luby-rackoff cipher with 4 rounds involving pufs and universal hash functions.
as well as on hash functions.
one must discover some unknown and undesirable property of the actual hash function; for good hash functions where such properties are believed unlikely,
has up to seven times the bandwidth improvement for hash functions compared to OpenSSL* algorithms,
encoding, hashing functions.
Mhash() applies a hash function specified by$hash to the$data.
By default the passwords are encrypted with the SHA-512 hash function.
What hashing function is used for the password?
SHA-1(Secure Hash Algorithm 1) is a hashing function that dates back to 1995.
One of the main applications of a hash function is to allow the fast look-up of a data in a hash table.
A hash function must be able to process an arbitrary-length message into a fixed-length output.
The SHA-2 hash function is implemented in some widely used security applications