About 103,000 results
Open links in new tab
  1. terminology - What exactly (and precisely) is "hash?" - Computer ...

    Apr 5, 2016 · Wikipedia has detailed articles on hash tables and cryptographic hash functions. What are you looking for that isn't in those?

  2. hashing - Difference between properties of good hash function ...

    Jun 9, 2016 · This is possible in practice if the hash function includes a random factor which is based on a secret seed. You could use a hash function that uses actual randomness and a …

  3. why not just use a random number generator as a hash function?

    A hash function usually means a function that compresses, meaning the output is shorter than the input. Often, such a function takes an input of arbitrary or almost arbitrary length to one whose …

  4. 到底什么是哈希值,哈希值到底是怎么生成的,有什么用? - 知乎

    由于他的调皮,导致客户挑妹纸的时间大幅延长,从10秒到了800秒。 在代码中,一般都有一些比较复杂的算法去运算而得出这个hash值,一旦破解了这个算法,就又可以调皮啦。 在JAVA …

  5. hash tables - Number of probes in a successful search in open …

    Mar 17, 2021 · Given an open-address hash table with α α < 1, the expected number of probes in a successful search is at most 1 αln 1 1−α 1 α ln 1 1 α I read this in a book and the proof starts …

  6. How exactly Hashing performs better than a Binary Search?

    Jun 30, 2017 · The biggest advantage of hashing vs. binary search is that it is much cheaper to add or remove an item from a hash table, compared to adding or removing an item to a sorted …

  7. What is the advantage of seperate chaining over open addressing?

    6 Hash tables resolve collisions through two mechanisms, separate chaining or open hashing and open addressing or closed hashing. Though the first method uses lists (or other fancier data …

  8. hash - Do passwords need a max length? - Computer Science …

    Jul 26, 2023 · A perfect hash would completely avoid any collision between passwords up to the length of the hash. For typical hash lengths, that means that collisions on passwords longer …

  9. cryptography - Given a string, is it possible to determine which ...

    Dec 31, 2016 · 2) a definite hash of a specific hashing algorithm? Possible methods: 1) For hashes susceptible to rainbow-table attacks, it would be viable to search for the hash in such a …

  10. Static hash tables - Computer Science Stack Exchange

    With four hash functions instead of two and one entry per slot, you can increase the density to 99%, but now you might need to compute up to four hash values as well as doing the four …