About 174,000 results
Open links in new tab
  1. terminology - What exactly (and precisely) is "hash?" - Computer ...

    Apr 5, 2016 · Wikipedia has detailed articles on hash tables and cryptographic hash functions. What are you looking for that isn't in those?

  2. 什么是 hash? - 知乎

    提到hash,相信大多数同学都不会陌生,之前很火现在也依旧很火的技术区块链背后的底层原理之一就是hash,下面就从hash算法的原理和实际应用等几个角度,对hash算法进行一个讲解。 …

  3. C++ 11的std::hash算法,使用了什么实际的哈希实现? - 知乎

    Dec 15, 2020 · Jenkins哈希函数(One-at-a-Time hash):由Bob Jenkins设计,它旨在提供一个快速计算并且分布均匀的哈希值。 CRC32:循环冗余校验(CRC)的一种形式,主要用于检 …

  4. 什么是哈希算法? - 知乎

    来分享下鹅厂 WXG 后开开发工程师 foxxiao对于 Hash的一些认识。 本文对完美 Hash 的概念进行了梳理,通过 Hash 构建步骤来了解它是如何解决 Hash 冲突的,并比较了 Hash 表和完美 …

  5. 如何通俗易懂地解释Hash算法的作用? - 知乎

    Jan 14, 2021 · (2) 数字签名 Hash 算法也是现代password体系中的一个重要组成部分。 因为非对称算法的运算速度较慢,所以在数字签名协议中,单向散列函数扮演了一个重要的角色。 对 …

  6. 双语:如数家珍 - GLib哈希表24个API函数 | Glib g_hash_table_*

    This is a convenience function for using a GHashTable as a set. It is equivalent to calling g_hash_table_replace () with key as both the key and the value. In particular, this means that …

  7. Hash size: Are prime numbers "near" powers of two a poor choice …

    Hash size: Are prime numbers "near" powers of two a poor choice for the modulus? Ask Question Asked 7 years, 11 months ago Modified 5 years, 8 months ago

  8. 什么是哈希洪水攻击(Hash-Flooding Attack)? - 知乎

    哈希洪水攻击(Hash-Flooding Attack) 是一种 拒绝服务攻击(Denial of Service),一旦后端接口存在合适的攻击面,攻击者就能轻松让整台服务器陷入瘫痪。 那么,所谓的“合适的攻击面” …

  9. hash tables - Number of probes in a successful search in open …

    Mar 17, 2021 · Given an open-address hash table with α < 1, the expected number of probes in a successful search is at most 1 αln 1 1 − α I read this in a book and the proof starts by saying …

  10. hash - Do passwords need a max length? - Computer Science …

    Jul 26, 2023 · A perfect hash would completely avoid any collision between passwords up to the length of the hash. For typical hash lengths, that means that collisions on passwords longer …