• Thumbnail for Perfect hash function
    In computer science, a perfect hash function h for a set S is a hash function that maps distinct elements in S to a set of m integers, with no collisions...
    24 KB (2,956 words) - 14:27, 22 July 2024
  • Thumbnail for Hash function
    output. The values returned by a hash function are called hash values, hash codes, hash digests, digests, or simply hashes. The values are usually used to...
    50 KB (7,445 words) - 00:27, 29 October 2024
  • Thumbnail for Hash collision
    Universal hashing – Technique for selecting hash functions Perfect hash function – Hash function without any collisions Injective map – Function that preserves...
    9 KB (1,142 words) - 10:46, 9 November 2024
  • Thumbnail for Hash table
    data type that maps keys to values. A hash table uses a hash function to compute an index, also called a hash code, into an array of buckets or slots...
    52 KB (5,873 words) - 15:26, 12 November 2024
  • dynamic perfect hashing is a programming technique for resolving collisions in a hash table data structure. While more memory-intensive than its hash table...
    13 KB (1,596 words) - 11:04, 16 May 2023
  • adjusted so that those inputs yield distinct hash values, producing what is called a perfect hash function. Two input strings differing by exactly one...
    4 KB (510 words) - 04:16, 23 June 2024
  • the perfect hash function. Using a minimum perfect hash function gives a big space improvement if the associated values are relatively small. Hashed filters...
    10 KB (1,514 words) - 14:40, 29 July 2024
  • non-cryptographic hash functions (NCHFs) are hash functions intended for applications that do not need the rigorous security requirements of the cryptographic hash functions...
    7 KB (796 words) - 04:17, 23 August 2024
  • squares (~bits in the corresponding hash function). As with other schemes which require a perfect hashing function, an exhaustive process of enumeration...
    23 KB (3,017 words) - 06:12, 15 July 2024
  • universal hashing (in a randomized algorithm or data structure) refers to selecting a hash function at random from a family of hash functions with a certain...
    29 KB (4,885 words) - 03:11, 15 November 2024
  • perfect hash function, and can be implemented using as few as O ( m log ⁡ log ⁡ log ⁡ n ) {\displaystyle O(m\log \log \log n)} bits. A succinct hash table...
    19 KB (2,896 words) - 02:28, 18 April 2024
  • values of a hash function, with H = 2 l {\textstyle H=2^{l}} . With a birthday attack, it is possible to find a collision of a hash function with 50 % {\textstyle...
    23 KB (3,296 words) - 01:37, 4 October 2024
  • Thumbnail for Avalanche effect
    cryptographic algorithms, typically block ciphers and cryptographic hash functions, wherein if an input is changed slightly (for example, flipping a single...
    5 KB (568 words) - 17:23, 14 December 2023
  • computer science, a family of hash functions is said to be k-independent, k-wise independent or k-universal if selecting a function at random from the family...
    15 KB (2,001 words) - 14:49, 17 October 2024
  • Thumbnail for Distributed hash table
    A distributed hash table (DHT) is a distributed system that provides a lookup service similar to a hash table. Key–value pairs are stored in a DHT, and...
    36 KB (4,185 words) - 07:05, 11 November 2024
  • alternative rock band from Auckland, New Zealand Perfect hash function, a set of hash functions which generate no collisions. Potentially Hazardous Food...
    1 KB (165 words) - 08:58, 2 August 2022
  • to cryptographic hash functions, which are designed to have significantly different hashes for even minor differences. Fuzzy hashing has been used to...
    9 KB (815 words) - 18:19, 27 April 2024
  • Thumbnail for Rendezvous hashing
    and disruption is minimal. Rendezvous hashing has the following properties: Low overhead: The hash function used is efficient, so overhead at the clients...
    31 KB (4,351 words) - 22:24, 10 November 2024
  • system can be linked against it as well. During the chroot phase, bash's hashing feature is turned off and the temporary toolchain's bin directory moved...
    28 KB (1,322 words) - 14:06, 12 September 2024
  • 2 n {\displaystyle 2n} . Hash function Dynamic perfect hashing Daniel Roche (2013). SI486D: Randomness in Computing, Hashing Unit. United States Naval...
    3 KB (449 words) - 00:07, 19 November 2023
  • Thumbnail for Cuckoo hashing
    Cuckoo hashing is a scheme in computer programming for resolving hash collisions of values of hash functions in a table, with worst-case constant lookup...
    23 KB (2,563 words) - 18:01, 1 August 2024
  • Thumbnail for Cycle sort
    duplicates of a relatively small number of items, a constant-time perfect hash function can greatly speed up finding where to put an item1, turning the...
    8 KB (918 words) - 20:53, 28 September 2024
  • Lamport signature (category Hash-based cryptography)
    be built from any cryptographically secure one-way function; usually a cryptographic hash function is used. Although the potential development of quantum...
    13 KB (2,001 words) - 09:26, 19 August 2023
  • Thumbnail for Board representation (computer chess)
    occupancy bits in the masked portion. One such scheme that uses a perfect hash function along with tricks to minimize the potential size of the table that...
    12 KB (1,734 words) - 11:56, 11 March 2024
  • their nesting GNU Fontutils – font management utilities GNU gperf – perfect hash function generator GNU indent – program to indent C and C++ source code GNU...
    24 KB (2,071 words) - 20:52, 19 September 2024
  • Thumbnail for Hopscotch hashing
    Hopscotch hashing is a scheme in computer programming for resolving hash collisions of values of hash functions in a table using open addressing. It is...
    7 KB (918 words) - 10:20, 1 June 2024
  • Bloom filter (category Hash-based data structures)
    different bit-fields of such a hash, so this type of hash can be used to generate multiple "different" hash functions by slicing its output into multiple...
    90 KB (10,778 words) - 23:06, 24 October 2024
  • Perfect matching Hamming distance Hash function Hash collision Perfect hash function Heilbronn triangle problem Helly family Hypergeometric function identities...
    7 KB (626 words) - 21:27, 20 August 2024
  • |S|=k} , there exists a hash function h in F such that h : S → {1, ..., k} is perfect. In other words, there must exist a hash function in F that colors any...
    13 KB (1,988 words) - 17:58, 17 November 2024
  • create a hashing function for a hash table, often a function is used that has a large domain. To create an index from the output of the function, a modulo...
    12 KB (1,741 words) - 16:12, 13 November 2024