About 31,800 results
Open links in new tab
  1. terminology - What exactly (and precisely) is "hash?" - Computer ...

    Apr 5, 2016 · A "hash" is a function h referred to as hash function that takes as input objects and outputs a string or number. The input objects are usually members of basic data types like …

  2. 什么是 hash? - 知乎

    提到hash,相信大多数同学都不会陌生,之前很火现在也依旧很火的技术区块链背后的底层原理之一就是hash,下面就从hash算法的原理和实际应用等几个角度,对hash算法进行一个讲解。 …

  3. What exactly is a hash function? - Computer Science Stack Exchange

    The main difference between hash functions and pseudorandom number generators is that a hash function gives a unique value for each input. This is important for applications such as …

  4. hashing - Difference between properties of good hash function ...

    Jun 9, 2016 · This is possible in practice if the hash function includes a random factor which is based on a secret seed. You could use a hash function that uses actual randomness and a …

  5. Time complexity of Hash table lookup - Computer Science Stack …

    Apr 21, 2020 · Suppose I have a hash table which stores the some strings. Let the index/key of this hash table be the length of the string. what is the time complexity of checking if the string …

  6. hash tables - Number of probes in a successful search in open …

    Mar 17, 2021 · Given an open-address hash table with α α < 1, the expected number of probes in a successful search is at most 1 αln 1 1−α 1 α ln 1 1 α I read this in a book and the proof starts …

  7. 到底什么是哈希值,哈希值到底是怎么生成的,有什么用? - 知乎

    由于他的调皮,导致客户挑妹纸的时间大幅延长,从10秒到了800秒。 在代码中,一般都有一些比较复杂的算法去运算而得出这个hash值,一旦破解了这个算法,就又可以调皮啦。 在JAVA …

  8. hash算法的数学原理是什么,如何保证尽可能少的碰撞? - 知乎

    hash相当与把值映射到另外一个空间。 第一个答案这一句话很对,说到了要点。 再详细一点,hash函数相当于,把原空间的一个数据集映射到另外一个空间。 所以说理论上的完美无碰 …

  9. cryptography - Given a string, is it possible to determine which ...

    Dec 31, 2016 · 2) a definite hash of a specific hashing algorithm? Possible methods: 1) For hashes susceptible to rainbow-table attacks, it would be viable to search for the hash in such a …

  10. Collision resistant hash function - Computer Science Stack Exchange

    The birthday attack applies to any hash-function, regardless of its structure, and also to hi h i. For your first question, here is a possible hint. Note that if we can find a collision in hi h i then we …