33 Why is it best to use a prime number as a mod in a hashing function? 2013-04-04T19:36:37.447

23 Is there an anti-Bloom filter? 2014-04-25T21:08:54.120

15 Could quantum computing eventually be used to make modern day hashing trivial to break? 2012-03-21T07:01:46.637

13 Function that spreads input 2012-11-14T20:53:55.090

10 Weak hashing function for memorable IPv6 addresses 2012-07-15T17:57:04.403

10 Why is a (collision-less) hashtable lookup really O(1)? 2016-01-30T19:37:15.767

9 Attack on hash functions that do not satisfy the one-way property 2012-04-11T16:25:33.290

8 Fast hashing: combination of different techniques to identify changes in a file? 2013-12-13T14:22:32.663

8 How to avoid cascading resizes when resizing hash tables? 2014-08-18T19:15:53.080

7 Is there a continuous hash? 2015-05-18T05:06:43.377

7 1-to-1 cryptographically secure bit shuffling 2015-12-19T21:14:59.650

6 Is the codomain/range of a hash function always $\mathbb{Z}$ or $\mathbb{N}$? 2012-11-15T14:03:29.847

6 Why does the Count-Min Sketch require pairwise independent hash functions? 2012-12-09T19:52:37.693

6 Bloom filter and perfect hashing 2013-06-03T15:20:55.557

6 Is it known whether the MD5 algorithm is surjective? 2015-06-02T13:29:52.563

6 Is the following intuition valid for understanding $k$-wise independent hash functions? 2015-12-19T00:44:07.293

6 Building static hash table with particular collisions 2016-02-14T17:34:57.590

6 Two definitions of universal hash functions 2016-04-12T10:32:39.187

6 Can proofs-of-work be probabilistically checkable? 2017-06-15T14:08:33.463

6 How similar is the Goldwasser-Sipser Set Lower Bound Protocol to the Hashcash/Bitcoin Proof-of-Work? 2017-07-30T20:28:20.273

5 A hash function with predicted collisions 2012-08-06T21:22:55.007

5 Find longest common substring using a rolling hash 2014-05-26T22:22:32.827

5 Double Hashing and Variations for Bloom Filters 2015-02-08T08:40:39.483

4 Hashing algorithm for millions of variable length strings (URLs) 2013-03-16T18:16:42.840

4 why not just use a random number generator as a hash function? 2013-09-25T17:24:39.487

4 How does taking modulo 1 make sense? 2013-11-18T21:11:51.583

4 How to find a 2-wise independent hash family that is not 3-wise independent? 2014-12-12T19:31:22.340

4 How should I design a hash table where all the keys are permutations? 2015-02-21T17:46:26.780

4 What exactly is a hash function? 2015-04-29T17:02:22.823

4 Finding similar high dimensional real vectors 2015-08-03T23:05:43.920

4 Understanding Murmur3 2016-02-14T02:45:16.280

4 Mean and variance of number of buckets of length $i$ in hashing with chaining 2016-05-11T12:36:56.920

4 Hash for verifying both compressed and uncompressed data? 2016-07-18T14:42:45.807

4 How can one find an element in a Merkle tree? 2016-07-28T08:11:28.500

4 What is the complexity class of solving hash decision problems? 2017-01-07T23:18:02.543

4 Check-digit algorithm that includes characters? 2017-04-27T20:30:24.910

3 Algorithm that hashes a collection of sets following their disjointness relation 2012-09-09T06:29:35.440

3 Why is the initial state of Zobrist hashing random? 2014-02-25T18:16:03.587

3 Why does the following function distribute things in a binomial distribution? 2014-03-28T00:27:13.283

3 Why does appending permutations of servers at the end of hash table avoid bottlenecks? 2014-03-28T00:36:28.957

3 Efficient set data structure supporting insert and set equal 2014-05-15T14:40:25.853

3 Term for binary search tree using hashes? 2014-07-03T16:13:23.430

3 Linear and almost-linear perfect hashing 2015-02-15T14:02:54.593

3 What are the examples of the easily computable "wild" permutations? 2015-04-08T00:36:01.163

3 Why is exact nearest neighbor search hard in high dimensional spaces? 2015-05-18T09:26:09.990

3 Why does this particular hashCode function help decrease collisions? 2015-08-15T07:43:28.947

3 Hash-Table in Practice 2015-10-19T19:28:51.210

3 Choosing a non-cryptographic hash function for language with no unsigned integers 2016-06-07T21:07:44.653

3 Information on Tavori and Dreizin ranged hash function? 2016-12-04T16:35:40.650

3 Do cryptographic hash function solve clustering problems with linear probing? 2016-12-16T20:50:44.267

3 Given a string, is it possible to determine which hashing algorithm has produced it, if any? 2016-12-30T18:02:03.417

3 Repeated fingerprinting after array updates 2017-01-23T20:31:50.457

3 Understanding of hash tables 2017-01-24T22:36:57.733

3 Hashing methods for validating dowloaded files 2017-05-24T08:04:17.573

3 What hash algorithm is it? 2017-05-31T13:09:12.527

3 Altering the size of a Hash 2017-06-14T20:10:49.877

3 What is the reasoning behind magic constancs in hash code calculations found in programming practice? 2017-07-05T10:21:19.107

3 Knuth's proof of O(1) for linear probing 2017-09-08T17:46:51.403

3 Hash size: do prime numbers "near" powers of two are bad? 2018-01-03T17:21:28.673

2 How do the following Hash Functions compare? 2012-10-27T03:38:30.673

2 Modulo hash function and multiples of three 2012-10-26T02:36:33.613

2 Collision resistant hash function 2013-01-13T18:21:29.690

2 What is Harrison hashing, its applications in web search engines? 2013-02-26T15:01:05.643

2 Hash function - uniformity / strong universality 2013-03-10T22:21:18.860

2 How to get expected running time of hash table? 2013-03-12T23:20:41.050

2 Proving calculating Minhash 2013-04-12T11:28:22.200

2 Collisions of a compression function 2013-04-23T17:22:51.767

2 Are those definitions of universal hash family equivalent? 2013-05-21T16:00:59.023

2 Find similar vector by Locality Sensitive Hashing 2013-07-18T14:41:29.760

2 Sequential numbers to unique-looking numbers 2014-02-04T16:53:53.890

2 Distance preserving projection for Euclidean distance 2014-03-28T22:09:00.227

2 Find $k$ subsets containing a particular element quickly 2014-05-09T20:05:44.160

2 Efficient representation of a given surjective function $\{1 \ldots N\} \rightarrow \{1 \ldots M\}$ when $N \gg M$ 2014-09-27T09:13:48.843

2 Hashing by doing modulo $m$ for $m=p^2$ for a prime $p$ instead of using a prime $m$ - is it that bad? 2014-10-16T22:11:59.953

2 Why having a simple multiplication loop and very good avalanche isn't enough to produce well-distributed hash values? 2014-10-30T21:19:06.673

2 Show that the following family of hash functions is $2$-wise independent but not $3$-wise independent 2014-12-01T22:07:09.993

2 Hash values that are impossible to reach 2014-12-12T23:27:23.270

2 Which fingerprinting/hashing algorithms support compounding? 2015-04-02T15:11:15.337

2 Stateless pseudorandom/hash algorithm for ℤⁿ → [0,1) 2015-04-28T22:12:54.620

2 About a particular use of hashing 2015-05-21T20:47:22.853

2 Collisions in independent hashing 2015-08-12T20:45:08.387

2 What is the formal analysis with Simple Uniform Hashing that the load factor is $\alpha = \frac{n}{m}$ 2016-02-16T00:02:26.873

2 Does hashing under the Simple Uniform Hashing Assumption battle worst-case adversaries the same way quick sort does? 2016-03-01T23:48:19.763

2 Simple pseudorandom split of data 2016-04-18T10:08:15.527

2 Hash function which is invariant under small changes 2016-04-25T15:16:09.603

2 Constraint on Universal set of hash functions 2016-05-26T20:25:56.527

2 Hash multiple integers directly using FNV-1a 2016-07-26T06:34:30.270

2 Locality-sensitive hashing random projection 2016-08-05T00:58:52.263

2 "Hash" Probing? 2017-07-28T07:07:16.080

2 Universal family of hash functions 2017-09-05T12:28:39.597

2 range / interval query algorithm 2017-09-12T23:38:39.087

2 Why is Big O not defined here for a hash table? 2017-10-18T20:05:21.960

2 Is there a heuristic or function to determine if two arrays of integers are alike or similar 2018-01-19T08:08:10.107

1 Is open adressing with prime steps bijective? 2012-05-22T08:09:20.643

1 Collisions of prefixes of MD5 hashes in some fixed interval 2012-09-25T14:52:01.787

1 Double hashing - probe count probabilities 2013-07-25T21:06:45.597

1 Min/max of hash function (Whirlpool) 2013-10-15T23:48:11.503

1 Hashing a Specific Range Of a Character Array 2013-12-11T10:59:54.037

1 Help in understanding exactly how lattices used as one way functions for hashing 2014-02-06T12:49:55.937