A technique for randomizing the input to a cryptographic hash function.
Sources:
NIST SP 800-106
A process by which the input to a hash function is randomized before being processed by the hash function.
Sources:
NIST SP 800-107 Rev. 1