Examples of using Hash functions in English and their translations into Portuguese
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Official/political
Hash functions based on block ciphers.
The widely used SHA-1 and SHA-2 hash functions were designed by NSA.
Hash functions can be used to build other cryptographic primitives.
It supports wide range of hash functions including MD5, SHA1, SHA2,….
Computer-induced transcription errors can be detected through hash functions.
The ciphers in hash functions are built for hashing. .
As of 2009, the two most commonly used cryptographic hash functions were MD5 and SHA-1.
Cryptographic hash functions can be built using block ciphers.
Pseudorandom number generators(PRNGs)can be built using hash functions.
They can also be useful as initialization vectors and in cryptographic hash functions.
The SHA hash functions have been used for the basis of the SHACAL block ciphers.
This property can be used to break naive authentication schemes based on hash functions.
Hash functions are commonly used to ensure data integrity, that is, ensure that the data haven¿t changed.
With the publication of FIPS PUB 180-2,NIST added three additional hash functions in the SHA family.
Hash functions accelerate table or database lookup by detecting duplicated records in a large file.
The hash algorithms provided by Convert String are common cryptographic hash functions.
Luby-Rackoff constructions using hash functions can be provably secure if the underlying hash function is secure.
Just as block ciphers can be used to build hash functions, hash functions can be used to build block ciphers.
This was done without sacrificing performance due to the great distribution achieved by these hash functions.
Message authentication codes(MACs)(also called keyed hash functions) are often built from hash functions.
Hash-based cryptography is the generic term for constructions of cryptographic primitives based on the security of hash functions.
However, compared with standard hash functions, cryptographic hash functions tend to be much more expensive computationally.
For instance, in August 2004 collisions were found in several then-popular hash functions, including MD5.
In cryptography, a preimage attack on cryptographic hash functions tries to find a message that has a specific hash value.
Cryptographic hash functions have many information-security applications, notably in digital signatures, message authentication codes(MACs), and other forms of authentication.
For instance, in August 2004 weaknesses were found in several then-popular hash functions, including SHA-0, RIPEMD, and MD5.
For Merkle-Damgård construction hash functions, the concatenated function is as collision-resistant as its strongest component, but not more collision-resistant.
Faster preimage attacks can be found by cryptanalysing certain hash functions, and are specific to that function. .