73 Tweetable hash function challenge 2016-04-01T11:03:04.587
63 Hash collision: "NO" means "YES" 2014-04-25T01:27:52.223
35 Help me recognise my monster 2017-01-01T23:07:14.840
34 Cryptographic hash golf 2015-05-31T14:44:50.913
34 26 Singers, 26 Letters 2017-10-10T07:21:33.403
26 Output with the same length always 2019-08-16T13:13:08.103
19 Meta radiation hardener 2017-02-23T02:23:34.377
18 Implement SHA-256 2016-06-03T16:42:13.627
17 Mine for 2016 in Bitcoins! PCG.SE New Year's Puzzle 2016 2016-01-01T01:42:24.693
16 Arbitrary Length Hashing 2018-10-10T16:49:15.173
15 Implementing the SHA-1 hash algorithm 2013-12-31T19:02:55.833
15 Rotation invariant fingerprinting 2018-12-16T17:20:05.257
14 Compute CRC32 Hash 2016-05-01T01:32:15.147
13 Morse code to standard output 2014-01-09T04:14:21.530
13 Logic Gates Manually 2018-10-06T01:53:50.750
12 Cryptographic hash golf (robbers) 2015-05-31T14:45:51.143
11 What characters are more common in my MD2 hash? 2017-04-19T15:11:42.273
10 Implement a Variable Length Hash 2015-03-24T22:47:16.623
7 Write a hash function for Morse Code 2014-01-31T12:31:15.807
7 Un-hash the Java Hash 2014-09-25T03:36:19.723
7 Geohash Generator 2017-01-15T14:02:21.327
6 Decode MD5, Brute Force 2014-11-30T16:36:33.637
2 Make a program that outputs its own MD5 hash 2015-12-03T21:37:36.143
1 Nearest hamming cycle period in MD5 2019-03-22T08:39:44.440
-1 Hide your hash function 2014-06-24T15:30:36.003
-5 Implement the MD5 algorithm! 2017-06-11T20:20:00.990