X-Nico

3 unusual facts about cryptographic hash function


Magnet URI scheme

Such a link typically identifies a file not by location, but by content—more precisely, by the content's cryptographic hash value.

Quicknet

This is achieved by using the same Cryptographic hash function in JavaScript code on the client-side, as well as PHP code on the server-side, to generate and compare hash results based on users’ passwords and some random data.

Suppression list

These include neutral third party scrubbing of email lists, distribution of MD5 secure hash suppression lists and distribution of "seeded" email lists.


Jenkins hash function

The Jenkins hash functions are a collection of (non-cryptographic) hash functions for multi-byte keys designed by Bob Jenkins.


see also

FNV

Fowler–Noll–Vo hash function, a non-cryptographic hash function created by Glenn Fowler, Landon Curt Noll, and Phong Vo