About 10,600 results
Open links in new tab
  1. algorithm - What is a good Hash Function? - Stack Overflow

    Aug 29, 2008 · 153 What is a good Hash function? I saw a lot of hash function and applications in my data structures courses in college, but I mostly got that it's pretty hard to make a good hash function. …

  2. c - hash function for string - Stack Overflow

    I'm working on hash table in C language and I'm testing hash function for string. The first function I've tried is to add ascii code and use modulo (% 100) but i've got poor results with the first ...

  3. c - What integer hash function are good that accepts an integer hash ...

    Mar 20, 2009 · This way the hash function covers all your hash space uniformly. Edit: The biggest disadvantage of this hash function is that it preserves divisibility, so if your integers are all divisible by …

  4. How do one-way hash functions work? (Edited) - Stack Overflow

    May 28, 2019 · EDIT: How do most cryptographic hash functions work? Usually they have at their core a single function that does complicated transformations on a block of bits (a block cipher). The function …

  5. Generate a Hash from string in Javascript - Stack Overflow

    I need to convert strings to some form of hash. Is this possible in JavaScript? I'm not utilizing a server-side language so I can't do it that way.

  6. Why should hash functions use a prime number modulus?

    Similarly a paranoid hash function should use a largeish prime constant, to reduce the chance that someone uses a number of buckets which happens to have a common factor with the constant. In …

  7. What does hash do in python? - Stack Overflow

    Jul 11, 2013 · Hash values should therefore not be stored permanently. If you need to use hash values in a permanent way you can take a look at the more "serious" types of hashes, cryptographic hash …

  8. What's a correct and good way to implement __hash__()?

    317 An easy, correct way to implement __hash__() is to use a key tuple. It won't be as fast as a specialized hash, but if you need that then you should probably implement the type in C. Here's an …

  9. cryptography - What is the Difference between a Hash and MAC …

    Apr 13, 2016 · A hash is a function that produces a digest from a message. A cryptographically secure hash is for which it is computationally infeasible to generate a message with a given digest.

  10. security - Fundamental difference between Hashing and Encryption ...

    I see a lot of confusion between hashes and encryption algorithms and I would like to hear some more expert advice about: When to use hashes vs encryptions What makes a hash or encryption algorithm