hash function
collocation in Englishmeaningsofhashandfunction
These words are often used together. Click on the links below to explore the meanings. Or,see other collocations withfunction.
hash
noun
uk/hæʃ/us/hæʃ/
a mixture of meat, potatoes, and vegetables cut into small pieces and baked ...
See more athash
function
noun
uk/ˈfʌŋk.ʃən/us/ˈfʌŋk.ʃən/
the natural purpose (of something) or the duty (of ...
See more atfunction
(Definition ofhashandfunctionfrom theCambridge English Dictionary© Cambridge University Press)
Examplesofhash function
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Tuning of thehashfunctionparameters leads to many variations.
From theCambridge English Corpus
The complexity of the function called depends on the connectionist model used, and may be comparable to a simplehashfunctionsometimes.
From theCambridge English Corpus
Uses a brute-force search to construct a perfecthashfunctionfor a set of 16 keywords. 150 lines.
From theCambridge English Corpus
There is however a simple and much faster algorithmic solution - using a trivialhashfunctiontable lookup.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
For example, each encryption key can be generated from the underlying key material using a cryptographichashfunctionor other key derivation function.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
The most secure don't store passwords at all, but a one-way derivation, such as a polynomial, modulus, or an advancedhashfunction.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
There exists a known weakness in the hash based key stretching algorithms that use an iterativehashfunction.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Only the collision attacks are of practical complexity; none of the attacks extend to the full roundhashfunction.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Seehashfunctionfor a much more detailed discussion.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
A rolling hash is ahashfunctionspecially designed to enable this operation.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
When a collision attack is discovered and is found to be faster than a birthday attack, ahashfunctionis often denounced as broken.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Because the check value has a fixed length, the function that generates it is occasionally used as ahashfunction.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
The technique is known as a trivialhashfunctionor, when used specifically for branch tables, double dispatch.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Cuckoo hashing, another technique for implementing hash tables, guarantees constant time per lookup (regardless of thehashfunction).
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
A poorhashfunctioncan exhibit poor performance even at very low load factors by generating significant clustering.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
A key collision is thehashfunctionmapping of different keys to the same position in a hash table.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
On top of that, it is possible for the secondaryhashfunctionto evaluate to zero.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
The downside is extra latency from computing thehashfunction.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
This analysis makes the (unrealistic) assumption that thehashfunctionis completely random, but can be extended also to 5-independent hash functions.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Central to this is the capacity of thehashfunction, which is the state bits that are not touched by input or output.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Want to learn more?
Go to the definition ofhash
Go to the definition offunction
See other collocations withfunction