Hashing
Preimage attack
SHA-1
MD5
NIST hash function competition
Collision resistance
Crypt
HMAC
SHA-2
Error detection and correction
Cryptography
Cryptographic hash functions