Adler-32 CRC32 CRC32 HAVAL MD5 MD5 MD2 MD2 MNP MNP SHA-1 SHA-1 SHA-256 SHA-256 SHA-384 SHA-384 SHA-512 SHA-512 TIGER TIGER Whirlpool WHIRLPOOL unknown Cryptographic Hash Functions A cryptographic hash function is a transformation that takes an input and returns a fixed-size string, which is called the hash value. Hash functions with this property are used for a variety of computational purposes, including cryptography. The hash value is a concise representation of the message or document from which it was computed. Cryptographic hash functions are used to do message integrity checks and digital signatures in various information security applications, such as authentication and message integrity. They may also be referred to as message digest algorithms or checksum algorithms. 2010-06-01T00:00:00 new Adler-32 CRC32 CRC32 HAVAL MD5 MD5 MD2 MD2 MNP MNP SHA-1 SHA-1 SHA-256 SHA-256 SHA-384 SHA-384 SHA-512 SHA-512 TIGER TIGER Whirlpool WHIRLPOOL unknown Library of Congress, Network Development and MARC Standards Office 2010-06-01T00:00:00 new