Questions tagged [hashing]
Challenges that involve summarizing a large amount of data in a single, much smaller number.
27 questions
- Bountied 0
- Unanswered
- Frequent
- Score
- Trending
- Week
- Month
- Unanswered (my tags)
3
votes
1
answer
317
views
Hashers and Crashers (Robbers)
This is the robbers thread of this cops and robbers challenge. The cops thread is here.
Related, but hashes numbers instead of strings and uses a different scoring system.
Definitions
A hash collision ...
7
votes
1
answer
348
views
Hashers and Crashers (Cops)
This is the cops thread of this cops and robbers challenge. The robbers thread is here.
Related, but hashes numbers instead of strings and uses a different scoring system.
Definitions
A hash collision ...
31
votes
30
answers
3k
views
Output with the same length always
With challenges like Output with the same length as the code and Create output twice the length of the code, I thought of a separate, but similar challenge.
The task is to produce an output. It can ...
1
vote
4
answers
468
views
Nearest hamming cycle period in MD5
This riddle was inspired by that thread. Consider that you are super-hacker and try to break MD5 hashing algorithm by looking for a hash collisions for a given hash string which your friend gave to ...
14
votes
8
answers
2k
views
Rotation invariant fingerprinting
Imagine we have some polyomino and would like to uniquely identify them, however the polyominos can be rotated, so blindly hashing them won't give us the same fingerprint for a piece and a rotation ...
16
votes
14
answers
2k
views
Arbitrary Length Hashing
Consider you have a hash function \$\mathcal{H}\$ which takes strings of length \2ドルn\$ and returns strings of length \$n\$ and has the nice property that it is collision resistant, i.e. it is hard to ...
13
votes
15
answers
2k
views
Logic Gates Manually
Make a program that simulates the basic logic gates.
Input: An all-caps word followed by 2 1 digit binary numbers, separated by spaces, such as OR 1 0. The gates <...
36
votes
19
answers
4k
views
26 Singers, 26 Letters
According to RollingStone, below are the 26 greatest singers of all time:
...
9
votes
9
answers
2k
views
What characters are more common in my MD2 hash?
The challenge is simple
Write a script that, when given a string input, will hash the string using the MD2 hashing algorithm, and then return either a positive integer or negative integer output ...
20
votes
3
answers
876
views
Meta radiation hardener
Background
On this site, we occasionally have questions requiring programs to be "radiation hardened"; this means that the program has to be able to survive the deletion of one or more bytes, no ...
user avatar
user62131
10
votes
5
answers
868
views
Geohash Generator
XKCD Comic:
Goal:
Given a date, the current Dow Opening, and your current coordinates as a rounded integer, produce a "geohash."
Input:
Input through any reasonable means (STDIN, function argument, ...
36
votes
10
answers
3k
views
Help me recognise my monster
Background
The computer game NetHack dates from 1987, before the use of graphics in computer games was widely established. There are lots of monsters in the game, and potentially a lot need to fit on ...
user avatar
user62131
25
votes
5
answers
2k
views
Implement SHA-256
Given a sequence of bytes, output the SHA-256 hash value of the sequence.
The SHA-256 Algorithm
The following pseudocode is taken from the Wikipedia page for SHA-2.
...
14
votes
9
answers
2k
views
Compute CRC32 Hash
Credits
This challenge originated from @miles.
Create a function that computes the CRC32 hash of an input string. The input will be an ASCII string of any length. The output will be the CRC32 hash of ...
72
votes
24
answers
5k
views
Tweetable hash function challenge
In this code-challenge you will write a hash function in 140 bytes1 or less of source code. The hash function must take an ASCII string as input, and return a 24-bit unsigned integer ([0, 224-1]) as ...