hash function

collocation in English

meaningsofhashandfunction

These words are often used together. Click on the links below to explore the meanings. Or,see other collocations withfunction.
hash
noun
uk
/hæʃ/
us
/hæʃ/
a mixture of meat, potatoes, and vegetables cut into small pieces and baked ...
See more athash
function
noun
uk
/ˈfʌŋk.ʃən/
us
/ˈfʌŋk.ʃən/
the natural purpose (of something) or the duty (of ...
See more atfunction

(Definition ofhashandfunctionfrom theCambridge English Dictionary© Cambridge University Press)

Examplesofhash function

These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Tuning of thehashfunctionparameters leads to many variations.
From theCambridge English Corpus
The complexity of the function called depends on the connectionist model used, and may be comparable to a simplehashfunctionsometimes.
From theCambridge English Corpus
Uses a brute-force search to construct a perfecthashfunctionfor a set of 16 keywords. 150 lines.
From theCambridge English Corpus
There is however a simple and much faster algorithmic solution - using a trivialhashfunctiontable lookup.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
For example, each encryption key can be generated from the underlying key material using a cryptographichashfunctionor other key derivation function.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
The most secure don't store passwords at all, but a one-way derivation, such as a polynomial, modulus, or an advancedhashfunction.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
There exists a known weakness in the hash based key stretching algorithms that use an iterativehashfunction.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Only the collision attacks are of practical complexity; none of the attacks extend to the full roundhashfunction.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Seehashfunctionfor a much more detailed discussion.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
A rolling hash is ahashfunctionspecially designed to enable this operation.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
When a collision attack is discovered and is found to be faster than a birthday attack, ahashfunctionis often denounced as broken.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Because the check value has a fixed length, the function that generates it is occasionally used as ahashfunction.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
The technique is known as a trivialhashfunctionor, when used specifically for branch tables, double dispatch.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Cuckoo hashing, another technique for implementing hash tables, guarantees constant time per lookup (regardless of thehashfunction).
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
A poorhashfunctioncan exhibit poor performance even at very low load factors by generating significant clustering.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
A key collision is thehashfunctionmapping of different keys to the same position in a hash table.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
On top of that, it is possible for the secondaryhashfunctionto evaluate to zero.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
The downside is extra latency from computing thehashfunction.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
This analysis makes the (unrealistic) assumption that thehashfunctionis completely random, but can be extended also to 5-independent hash functions.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Central to this is the capacity of thehashfunction, which is the state bits that are not touched by input or output.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Want to learn more?
Go to the definition ofhash
Go to the definition offunction
See other collocations withfunction