Encyclopedia

hash function

Also found in: Dictionary, Medical, Financial, Wikipedia.

hash function

(programming)
A hash coding function which assigns a data item distinguished by some "key" into one of a number of possible "hash buckets" in a hash table. The hash function is usually combined with another more precise function.

For example a program might take a string of letters and put it in one of twenty six lists depending on its first letter. Ideally, a hash function should distribute items evenly between the buckets to reduce the number of hash collisions. If, for example, the strings were names beginning with "Mr.", "Miss" or "Mrs." then taking the first letter would be a very poor hash function because all names would hash the same.
This article is provided by FOLDOC - Free Online Dictionary of Computing (foldoc.org)

hash function

An algorithm that turns a variable amount of data into a small, fixed-length value called a "hash value," "hash code" or "digest." See SHA, hash and cryptographic hash function.


The Hash Is Always Fixed in Length
No matter the size of the message (the data being hashed), the resulting hash is a fixed length binary number that cannot be converted back into the original data.
Copyright © 1981-2025 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
Mentioned in
References in periodicals archive
Choose a hash function H(*):{0,1}* [right arrow] [Z.sup.n.sub.q].
Certain drug development methods require injecting various fluids at specific points in time, similar to the way a hash function performs a precise order of equations.
The protocol adapts both of the symmetric and asymmetric cryptography techniques as well as hash functions. The protocol includes two main sub protocols: The Registration protocol which is executed between the authentication server and mobiles; and Authentication protocol which is executed between the Mobile (U1) and Authentication Center (AuC) through Mobile (U2).
I could write a similarly simple hash function for images.
Suppose we want to learn K hash functions that leading to a X-digit representation B of X.
A 160 bit hash function that is related to previous algorithm but more conservative.
A random hash function [f.sub.R] from [F.sup.n.sub.2] to [F.sup.m.sub.2] is called [delta]-almost [universal.sub.2] when
a hash function. For example, a function g(x)=[ x/2], divides x by 2,
At the same time, the system effectively integrates a lightweight RFID authentication protocol based on Hash function to achieve secure access and privacy protection.
Copyright © 2003-2025 Farlex, Inc Disclaimer
All content on this website, including dictionary, thesaurus, literature, geography, and other reference data is for informational purposes only. This information should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional.