ReadWhitepaper
Livres blancs
Stories ▾
All Stories →
Whitepaper Deep Dive Section-by-section whitepaper analysis Origin Story Project founding and publication context Technical Explainer Simplified technical deep dives Impact & Legacy Industry influence and lasting effects Comparison Cross-whitepaper analysis and contrasts
RSS Feed
Figures
Glossaire ▾
All Terms →
Consensus Cryptography Mining Transactions Network Smart Contracts Tokenomics DeFi Scaling Governance Wallets & Keys Stablecoins
Graphique Rechercher
🇺🇸 English English 🇰🇷 한국어 Korean 🇯🇵 日本語 Japanese 🇨🇳 中文简体 Chinese (Simplified) 🇪🇸 Español Spanish 🇧🇷 Português Portuguese 🇮🇳 हिन्दी Hindi 🇸🇦 العربية Arabic 🇫🇷 Français French 🇷🇺 Русский Russian 🇩🇪 Deutsch German 🇹🇷 Türkçe Turkish 🇻🇳 Tiếng Việt Vietnamese 🇮🇩 Bahasa Indonesia Indonesian 🇹🇭 ไทย Thai
Livres blancs Stories Figures Glossaire Graphique Rechercher
Glossaire

Catégorie

cryptography

Alias

hash function

Cryptographic Hash Function

Fonction de hachage cryptographique

Cryptography 1 references

Une fonction qui mappe des données arbitraires à un résumé de taille fixe. Les bonnes fonctions de hachage sont résistantes à la pré-image, à la seconde pré-image et aux collisions.

Apparaît dans 1 sections de livres blancs

Solana logo
$SOL Solana
Proof of History
...he passage of time between two events. It uses a sequential pre-image resistant hash function — specifically SHA-256 — that is run continuously, with the previous output use...

Related Stories

Origin Story

Monero's Origin: The CryptoNote Revolution and the Fight for Financial Privacy

How an anonymous whitepaper by 'Nicolas van Saberhagen' led to a community fork that created the gold standard of priva…

Technical Explainer

Merkle Trees: The Data Structure That Makes Blockchains Possible

How hash trees enable efficient verification of massive datasets, from Bitcoin's SPV to Ethereum's state tries and beyo…

Comparison

Privacy in Crypto: Bitcoin's Pseudonymity vs Monero's Anonymity

Comparing Bitcoin's transparent ledger with Monero's ring signatures and stealth addresses — the spectrum of financial …

ReadWhitepaper

Lisez des livres blancs sur la cryptographie dans plus de 15 langues avec traduction côte à côte.

Contenu

  • Livres blancs
  • Stories
  • Figures
  • Glossaire
  • Graphique
  • Rechercher
  • À propos

Développeurs

  • Documentation sur l'API
  • OpenAPI
  • llms.txt
  • llms-full.txt

Abonnement

  • RSS
  • Atom
  • Stories RSS
  • Sitemap
  • robots.txt

Légal

  • Termes
  • Confidentialité
© 2026 ReadWhitepaper Conçu pour la communauté crypto.