About 34,300 results
Open links in new tab
  1. terminology - What exactly (and precisely) is "hash?" - Computer ...

    Apr 5, 2016 · Typically it is correct to say that the output of a hash function is a hash (aslo known as a hash value or a hash sum). However, sometimes people refer to the function itself as a …

  2. hash - Do passwords need a max length? - Computer Science …

    Jul 26, 2023 · Hash algorithms are designed to produce a practically random output, so for a 24-byte (192-bit) hash, you'd need on the order of $ 2^{96} $ or $ 10^{30} $ inputs to have an …

  3. Hash tables versus binary trees - Computer Science Stack Exchange

    In particular, if you're going to need the order on the keys, for example if you want to be able to list the keys in alphabetical order, then hash tables are no help (you'll need to sort them), whereas …

  4. hash - What would happen SHA-256 collision were to be found?

    Nov 14, 2023 · As far as I and this wikipedia page know, there are no collisions (2 inputs with the same output) found in SHA-256 (yet). what would happen if a collision were to be found, 1. …

  5. hash tables - Number of probes in a successful search in open …

    Mar 17, 2021 · Given an open-address hash table with $\alpha$ < 1, the expected number of probes in a successful search is at most $\frac{1}{\alpha}\ln\frac{1}{1-\alpha}$ I read this in a …

  6. Hash size: Are prime numbers "near" powers of two a poor choice …

    This answer possibly explains why choosing M(table size) equal to a power of 2 should be avoided.. Prime numbers that are too close to a power of 2 will provide the same kind of …

  7. 什么是 hash? - 知乎

    整个Hash算法的过程就是把原始任意长度的值空间,映射成固定长度的值空间的过程。 2、Hash的特点. 一个优秀的hash算法,需要什么样的要求呢? a)、从hash值不可以反向推导出 …

  8. 到底什么是哈希值,哈希值到底是怎么生成的,有什么用? - 知乎

    hash值是通过一个计算函数把难以比较的字符串或者其他类型的数据映射成一个整数,最常用的就是映射a~z的hash值,变成hash[(str(i)-‘a’]这个数是一个十进制数,这个十进制数把它映射到0 …

  9. 哈希理论上会出现重复吗? - 知乎

    知乎,中文互联网高质量的问答社区和创作者聚集的原创内容平台,于 2011 年 1 月正式上线,以「让人们更好的分享知识、经验和见解,找到自己的解答」为品牌使命。知乎凭借认真、专业 …

  10. What is the advantage of seperate chaining over open addressing?

    The hash nodes are a little bigger, but all of the hash values to check are in the same cache line. If you're particularly lucky, the compiler may even turn this into a SIMD operation for you. If the …

Refresh