 |
Cryptographic hash function - Wikipedia, the free encyclopedia
1 Properties 1.1 Degree of difficulty 2 Illustration 3 Applications 3.1 Verifying the integrity of files or messages 3.2 Password verification 3.3 Proof-of-work 3.4 File or data identifier 3.5 Pseudorandom generation and key derivation 4 Hash functions ba
en.wikipedia.org |
 |