data type that maps keys to values. A hash table uses a hash function to compute an index, also called a hash code, into an array of buckets or slots...
53 KB (5,944 words) - 17:05, 28 March 2025
A distributed hash table (DHT) is a distributed system that provides a lookup service similar to a hash table. Key–value pairs are stored in a DHT, and...
36 KB (4,182 words) - 03:10, 12 April 2025
hash function are called hash values, hash codes, (hash/message) digests, or simply hashes. The values are usually used to index a fixed-size table called...
50 KB (7,467 words) - 03:03, 8 May 2025
A rainbow table is a precomputed table for caching the outputs of a cryptographic hash function, usually for cracking password hashes. Passwords are typically...
24 KB (3,485 words) - 05:27, 9 May 2025
Cuckoo hashing is a scheme in computer programming for resolving hash collisions of values of hash functions in a table, with worst-case constant lookup...
23 KB (2,591 words) - 09:19, 30 April 2025
Open addressing (redirect from Open address hash table)
Open addressing, or closed hashing, is a method of collision resolution in hash tables. With this method a hash collision is resolved by probing, or searching...
8 KB (1,044 words) - 21:06, 1 March 2025
concurrent hash table or concurrent hash map is an implementation of hash tables allowing concurrent access by multiple threads using a hash function....
16 KB (1,792 words) - 01:25, 8 April 2025
computer science, a hash collision or hash clash is when two distinct pieces of data in a hash table share the same hash value. The hash value in this case...
9 KB (1,142 words) - 10:46, 9 November 2024
Associative array (redirect from Hash array)
associative arrays. The two major solutions to the dictionary problem are hash tables and search trees. It is sometimes also possible to solve the problem...
24 KB (2,802 words) - 02:21, 23 April 2025
A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
49 KB (6,299 words) - 20:13, 4 May 2025
computing, universal hashing (in a randomized algorithm or data structure) refers to selecting a hash function at random from a family of hash functions with...
29 KB (4,885 words) - 22:53, 23 December 2024
In computer science, consistent hashing is a special kind of hashing technique such that when a hash table is resized, only n / m {\displaystyle n/m} keys...
22 KB (2,597 words) - 20:01, 4 December 2024
building hash tables from the tuples of one or both of the joined relations, and subsequently probing those tables so that only tuples with the same hash code...
8 KB (1,173 words) - 06:50, 29 July 2024
Perfect hash functions may be used to implement a lookup table with constant worst-case access time. A perfect hash function can, as any hash function...
23 KB (2,870 words) - 13:49, 29 March 2025
{\displaystyle k} , a hash table would store the value v {\displaystyle v} in the slot h ( k ) {\displaystyle h(k)} where h {\displaystyle h} is a hash function i...
22 KB (3,067 words) - 08:54, 20 February 2025
Chord (peer-to-peer) (redirect from Chord (distributed hash table))
a protocol and algorithm for a peer-to-peer distributed hash table. A distributed hash table stores key-value pairs by assigning keys to different computers...
17 KB (2,496 words) - 22:07, 25 November 2024
this is where the collision chain is used. This hash table is known as a hash anchor table. The hashing function is not generally optimized for coverage...
17 KB (2,462 words) - 20:30, 8 April 2025
Merkle tree (redirect from Tiger-Tree Hash)
the above picture hash 0 is the result of hashing the concatenation of hash 0-0 and hash 0-1. That is, hash 0 = hash( hash 0-0 + hash 0-1 ) where "+" denotes...
15 KB (1,790 words) - 06:31, 3 March 2025
as fast table lookup (hash tables) and distributed databases (distributed hash tables). A hash list is an extension of the concept of hashing an item...
3 KB (490 words) - 17:39, 17 December 2024
symbol tables is the hash table. The time for searching in hash tables is independent of the number of elements stored in the table, so it is efficient for...
15 KB (1,208 words) - 19:13, 20 April 2025
In computer science, locality-sensitive hashing (LSH) is a fuzzy hashing technique that hashes similar input items into the same "buckets" with high probability...
30 KB (4,024 words) - 17:28, 16 April 2025
FNV offset basis yield the following table of FNV hash parameters: The FNV hash was designed for fast hash table and checksum use, not cryptography. The...
15 KB (1,358 words) - 15:56, 7 April 2025
A hash array mapped trie (HAMT) is an implementation of an associative array that combines the characteristics of a hash table and an array mapped trie...
6 KB (613 words) - 22:49, 23 December 2024
Succinct data structure (redirect from Succinct hash table)
perfect hash function, and can be implemented using as few as O ( m log log log n ) {\displaystyle O(m\log \log \log n)} bits. A succinct hash table, also...
19 KB (2,896 words) - 15:02, 4 April 2025
Salt (cryptography) (redirect from Salted hash)
function that hashes data, a password or passphrase. Salting helps defend against attacks that use precomputed tables (e.g. rainbow tables), by vastly growing...
13 KB (1,533 words) - 12:18, 19 January 2025
non-cryptographic hash functions, such as CityHash;: 496 this can be used to prevent denial-of-service attacks against hash tables ("hash flooding"), or...
14 KB (1,342 words) - 17:18, 17 February 2025
Linear probing (category Hashing)
probing is a scheme in computer programming for resolving collisions in hash tables, data structures for maintaining a collection of key–value pairs and...
28 KB (3,605 words) - 19:02, 14 March 2025
List of data structures (redirect from Hash-based data structures)
Distributed hash table Double hashing Dynamic perfect hash table Hash array mapped trie Hash list Hash table Hash tree Hash trie Koorde Prefix hash tree Rolling...
9 KB (914 words) - 05:55, 20 March 2025
Set (abstract data type) (redirect from HashSet)
generic HashSet and BTreeSet types. Java offers the Set interface to support sets (with the HashSet class implementing it using a hash table), and the...
25 KB (2,958 words) - 08:16, 28 April 2025
compiler), the permutation table can be adjusted so that those inputs yield distinct hash values, producing what is called a perfect hash function. Two input...
4 KB (511 words) - 17:23, 17 December 2024