About 32,300 results
Open links in new tab
  1. terminology - What exactly (and precisely) is "hash?" - Computer ...

    Apr 5, 2016 · A "hash" is a function h h referred to as hash function that takes as input objects and outputs a string or number. The input objects are usually members of basic data types like …

  2. 什么是 hash? - 知乎

    提到hash,相信大多数同学都不会陌生,之前很火现在也依旧很火的技术区块链背后的底层原理之一就是hash,下面就从hash算法的原理和实际应用等几个角度,对hash算法进行一个讲解。 …

  3. What exactly is a hash function? - Computer Science Stack Exchange

    The main difference between hash functions and pseudorandom number generators is that a hash function gives a unique value for each input. This is important for applications such as …

  4. 到底什么是哈希值,哈希值到底是怎么生成的,有什么用? - 知乎

    由于他的调皮,导致客户挑妹纸的时间大幅延长,从10秒到了800秒。 在代码中,一般都有一些比较复杂的算法去运算而得出这个hash值,一旦破解了这个算法,就又可以调皮啦。 在JAVA …

  5. hash tables - Number of probes in a successful search in open …

    Mar 17, 2021 · Given an open-address hash table with α α < 1, the expected number of probes in a successful search is at most 1 αln 1 1−α 1 α ln 1 1 − α I read this in a book and the proof …

  6. hashing - Difference between properties of good hash function ...

    Jun 9, 2016 · In fact, there is no hash function that satisfies randomness for all datasets: for any hash function (with at least two buckets), a data set consisting solely of values that hash to …

  7. hash - Do passwords need a max length? - Computer Science …

    Jul 26, 2023 · A perfect hash would completely avoid any collision between passwords up to the length of the hash. For typical hash lengths, that means that collisions on passwords longer …

  8. C++ 11的std::hash算法,使用了什么实际的哈希实现? - 知乎

    Dec 15, 2020 · Jenkins哈希函数(One-at-a-Time hash):由Bob Jenkins设计,它旨在提供一个快速计算并且分布均匀的哈希值。 CRC32:循环冗余校验(CRC)的一种形式,主要用于检 …

  9. Hash tables versus binary trees - Computer Science Stack Exchange

    When implementing a dictionary ('I want to look up customer data by their customer IDs'), the typical data structures used are hash tables and binary search trees. I know for instance that …

  10. Collision resistant hash function - Computer Science Stack Exchange

    For which (εi, ti) is hi (εi, ti) -collision resistant? And can we successfully use the birthday attack on this hash function to find collisions?