answersLogoWhite

0

What is a hash function in java?

User Avatar

Anonymous

15y ago
Updated: 8/17/2019

http://www.partow.net/programming/hashfunctions/

please refer this website. i think its the best so far

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

What is the best way of referring to the output of a secure hash function?

The output from a hash function is referred to as the hash value, hash code, hash sum, checksum or just plain "hash" as in "the hash of the file is...". Generally a hash function is presumed to be secure or it wouldn't be used. If a hash is not secure it could be referred to as "worthless" or "false sense of security".


What is hash key?

hash key is an element in the hash table. it is the data that you will combine (mathematical) with hash function to produce the hash.


What is a hash function?

hash function is technique used in message authentication it is attached to the message for security purpose


Insert value into hash table?

Insertion in hash tables is based on a 'key' value which is calculated on the basis of a hash function. This hash function generates the key based on what type of data it is fed. For example hash function for an integer input might look like this : int hash(int val) { return (val%101); } where return value of hash function would become a key. Complete implementation can be found at: http://simplestcodings.blogspot.com/2010/07/hash-table.html


What is double hashing in data structure?

if collision is occurred in hash function then we can solve this problem by using double hash function


What is a decryption of the hash string 108933322ed670db49b0141d10f6dbbe?

To decode a hash string you first need to know what hash function was used to encode it.


What changes in HMAC are required in order to replace one underlying hash function with another?

To replace an underlying hash function in HMAC, you need to modify the way the hash function is used within the HMAC algorithm, such as the block size and padding. You may also need to adjust the way the key is processed in the HMAC calculation based on the requirements of the new hash function. It is important to ensure that the security properties of the new hash function align with the security assumptions of HMAC.


What is HashMap Java used for?

HashMap Java is used as a definition in Java software programming language. This version of Java is used to tag objects using hash numbers and therefore differentiate different items in different databases.


What is function in java terminology?

In Java, a function is called a "method". In Java as well as other languages, a method is a function defined specifically for one class. In Java, this is the only way to define functions, therefore, all functions are methods.In Java, a function is called a "method". In Java as well as other languages, a method is a function defined specifically for one class. In Java, this is the only way to define functions, therefore, all functions are methods.In Java, a function is called a "method". In Java as well as other languages, a method is a function defined specifically for one class. In Java, this is the only way to define functions, therefore, all functions are methods.In Java, a function is called a "method". In Java as well as other languages, a method is a function defined specifically for one class. In Java, this is the only way to define functions, therefore, all functions are methods.


Is main a predefined function in java?

No. It is a user defined function which the person who is creating the java class has to code by himself.


What are the methods of hash table?

See the related link below for the Java API documentation for the Hashtable class and its methods.


Define hashing and describe briefly including types of hashing and where it is used and advantages and disadvantages of hashing?

Hashing is performed on arbitrary data by a hash function. A hash function is any function that can convert data to either a number or an alphanumeric code. There are possibly as many types of hashing as there are data. How precisely the hash function works depends on what data it is meant to generate a hash code from. Hashing is used for a variety of things. For example, a hash table is a data structure used for storing data in memory. Instead of iterating through the structure to find a specific item, we associate a key (hash code) to a particular item (data). A hash code can be generated from a file or disk image. If the data does not match the code, then the data is assumed to be corrupted. Hashing has the advantage of taking a larger amount of data and representing it as a smaller amount of data (hash code). The code generated is unique to the data it came from. Generating a hash code can take time however, depending on the function and the data. Some hash functions include Bernstein hash, Fowler-Noll-Vo hash, Jenkins hash, MurmurHash, Pearson hashing and Zobrist hashing.