About 35,300 results
Open links in new tab
  1. terminology - What exactly (and precisely) is "hash?" - Computer ...

    Apr 5, 2016 · Typically it is correct to say that the output of a hash function is a hash (aslo known as a hash value or a hash sum). However, sometimes people refer to the function itself as a …

  2. hash - What would happen SHA-256 collision were to be found?

    Nov 14, 2023 · As far as I and this wikipedia page know, there are no collisions (2 inputs with the same output) found in SHA-256 (yet). what would happen if a collision were to be found, 1. …

  3. hash - How is this the expected number of of probes in open …

    I am reading the "Introduction to Algorithms" by Thomas Cormen et al.Particularly the theorem which says that given an open-address hash table with load factor $\alpha = n/m < 1$, the …

  4. 到底什么是哈希值,哈希值到底是怎么生成的,有什么用? - 知乎

    hash值是通过一个计算函数把难以比较的字符串或者其他类型的数据映射成一个整数,最常用的就是映射a~z的hash值,变成hash[(str(i)-‘a’]这个数是一个十进制数,这个十进制数把它映射到0 …

  5. hash tables - Number of probes in a successful search in open …

    Mar 17, 2021 · Given an open-address hash table with $\alpha$ < 1, the expected number of probes in a successful search is at most $\frac{1}{\alpha}\ln\frac{1}{1-\alpha}$ I read this in a …

  6. Hash size: Are prime numbers "near" powers of two a poor choice …

    This answer possibly explains why choosing M(table size) equal to a power of 2 should be avoided.. Prime numbers that are too close to a power of 2 will provide the same kind of …

  7. 什么是 hash? - 知乎

    整个Hash算法的过程就是把原始任意长度的值空间,映射成固定长度的值空间的过程。 2、Hash的特点. 一个优秀的hash算法,需要什么样的要求呢? a)、从hash值不可以反向推导出 …

  8. hash - Do passwords need a max length? - Computer Science …

    Jul 26, 2023 · Hash algorithms are designed to produce a practically random output, so for a 24-byte (192-bit) hash, you'd need on the order of $ 2^{96} $ or $ 10^{30} $ inputs to have an …

  9. why not just use a random number generator as a hash function?

    If I understand the question correctly, the answer is simple: if Hash(object) returns 27 when you call it this afternoon, we want Hash(object) to return 27 if we call it next week, on a different …

  10. Reversible hash function (?) - Computer Science Stack Exchange

    Oct 20, 2022 · The keys to be stored in the hash table are known in advance. In this case, it is possible to construct a hash function that is injective over the set of stored keys; this is, …

Refresh