Skip to main content

Questions tagged [hashing]

Challenges that involve summarizing a large amount of data in a single, much smaller number.

Filter by
Sorted by
Tagged with
3 votes
1 answer
317 views

This is the robbers thread of this cops and robbers challenge. The cops thread is here. Related, but hashes numbers instead of strings and uses a different scoring system. Definitions A hash collision ...
The Empty String Photographer's user avatar
31 votes
30 answers
3k views

With challenges like Output with the same length as the code and Create output twice the length of the code, I thought of a separate, but similar challenge. The task is to produce an output. It can ...
maxb's user avatar
  • 7,017
14 votes
8 answers
2k views

Imagine we have some polyomino and would like to uniquely identify them, however the polyominos can be rotated, so blindly hashing them won't give us the same fingerprint for a piece and a rotation ...
ბიმო's user avatar
13 votes
15 answers
2k views

Make a program that simulates the basic logic gates. Input: An all-caps word followed by 2 1 digit binary numbers, separated by spaces, such as OR 1 0. The gates <...
qazwsx's user avatar
  • 1,194
9 votes
9 answers
2k views

The challenge is simple Write a script that, when given a string input, will hash the string using the MD2 hashing algorithm, and then return either a positive integer or negative integer output ...
Mayube's user avatar
  • 11.8k
10 votes
5 answers
868 views

XKCD Comic: Goal: Given a date, the current Dow Opening, and your current coordinates as a rounded integer, produce a "geohash." Input: Input through any reasonable means (STDIN, function argument, ...
Julian Lachniet's user avatar
26 votes
5 answers
2k views

Given a sequence of bytes, output the SHA-256 hash value of the sequence. The SHA-256 Algorithm The following pseudocode is taken from the Wikipedia page for SHA-2. ...
user avatar
72 votes
24 answers
5k views

In this code-challenge you will write a hash function in 140 bytes1 or less of source code. The hash function must take an ASCII string as input, and return a 24-bit unsigned integer ([0, 224-1]) as ...
orlp's user avatar
  • 39.4k
2 votes
0 answers
1k views

Challenge: make a program that outputs a MD5 hash of its source code. You should not use tricks that would be considered cheating in a quine sense (discussed here). Using built-in functions and ...
anatolyg's user avatar
  • 14.1k
35 votes
23 answers
5k views

This contest is over. Due to the nature of cops-and-robbers challenges, the cops challenge becomes a lot easier when the interest in the associated robbers challenge has diminished. Therefore, ...
Dennis's user avatar
  • 212k
8 votes
6 answers
3k views

The Challenge Create a program that brute-force* decodes the MD5-hashed string, given here: 92a7c9116fa52eb83cf4c2919599c24a which translates to ...
parzivail's user avatar
-2 votes
3 answers
858 views

So you are tasked with creating an open source password authentication system but you want to reveal as little about the implementation of the hash function as possible. Can you write a function that ...
ford prefect's user avatar
6 votes
10 answers
2k views

Your goal is to write a hash function, that accepts morse code character and returns a hash code that you get to define. You can be sure, passed string will be: One of the Latin characters (A-Z) ...
awesoon's user avatar
  • 187
15 votes
5 answers
1k views

The goal of this code-golf is to create a program that takes a string as input, and you have to output the SHA-1 hash value as a hexadecimal number. You can find the pseudocode for SHA-1 here Other ...
user3094403's user avatar
  • 8,375