Skip to main content

Questions tagged [hashing]

Challenges that involve summarizing a large amount of data in a single, much smaller number.

3 votes
1 answer
317 views

This is the robbers thread of this cops and robbers challenge. The cops thread is here. Related, but hashes numbers instead of strings and uses a different scoring system. Definitions A hash collision ...
The Empty String Photographer's user avatar
7 votes
1 answer
348 views

This is the cops thread of this cops and robbers challenge. The robbers thread is here. Related, but hashes numbers instead of strings and uses a different scoring system. Definitions A hash collision ...
The Empty String Photographer's user avatar
31 votes
30 answers
3k views

With challenges like Output with the same length as the code and Create output twice the length of the code, I thought of a separate, but similar challenge. The task is to produce an output. It can ...
maxb's user avatar
  • 7,017
1 vote
4 answers
468 views

This riddle was inspired by that thread. Consider that you are super-hacker and try to break MD5 hashing algorithm by looking for a hash collisions for a given hash string which your friend gave to ...
Agnius Vasiliauskas's user avatar
14 votes
8 answers
2k views

Imagine we have some polyomino and would like to uniquely identify them, however the polyominos can be rotated, so blindly hashing them won't give us the same fingerprint for a piece and a rotation ...
ბიმო's user avatar
16 votes
14 answers
2k views

Consider you have a hash function \$\mathcal{H}\$ which takes strings of length \$2n\$ and returns strings of length \$n\$ and has the nice property that it is collision resistant, i.e. it is hard to ...
Laikoni's user avatar
  • 26.4k
13 votes
15 answers
2k views

Make a program that simulates the basic logic gates. Input: An all-caps word followed by 2 1 digit binary numbers, separated by spaces, such as OR 1 0. The gates <...
qazwsx's user avatar
  • 1,194
36 votes
19 answers
4k views

According to RollingStone, below are the 26 greatest singers of all time: ...
Arnauld's user avatar
  • 206k
9 votes
9 answers
2k views

The challenge is simple Write a script that, when given a string input, will hash the string using the MD2 hashing algorithm, and then return either a positive integer or negative integer output ...
Mayube's user avatar
  • 11.8k
20 votes
3 answers
877 views

Background On this site, we occasionally have questions requiring programs to be "radiation hardened"; this means that the program has to be able to survive the deletion of one or more bytes, no ...
user avatar
10 votes
5 answers
868 views

XKCD Comic: Goal: Given a date, the current Dow Opening, and your current coordinates as a rounded integer, produce a "geohash." Input: Input through any reasonable means (STDIN, function argument, ...
Julian Lachniet's user avatar
36 votes
10 answers
3k views

Background The computer game NetHack dates from 1987, before the use of graphics in computer games was widely established. There are lots of monsters in the game, and potentially a lot need to fit on ...
user avatar
26 votes
5 answers
2k views

Given a sequence of bytes, output the SHA-256 hash value of the sequence. The SHA-256 Algorithm The following pseudocode is taken from the Wikipedia page for SHA-2. ...
user avatar
14 votes
9 answers
2k views

Credits This challenge originated from @miles. Create a function that computes the CRC32 hash of an input string. The input will be an ASCII string of any length. The output will be the CRC32 hash of ...
Leaky Nun's user avatar
  • 50.6k
72 votes
24 answers
5k views

In this code-challenge you will write a hash function in 140 bytes1 or less of source code. The hash function must take an ASCII string as input, and return a 24-bit unsigned integer ([0, 224-1]) as ...
orlp's user avatar
  • 39.4k

15 30 50 per page