hash collision


Also found in: Wikipedia.

hash collision

(programming)
(Or "hash clash") When two different keys hash to the same value, i.e. to the same location in a hash table.

ESR once asked a friend what he expected Berkeley to be like. The friend replied, "Well, I have this mental picture of naked women throwing Molotov cocktails, but I think that's just a collision in my hash tables."
This article is provided by FOLDOC - Free Online Dictionary of Computing (foldoc.org)
References in periodicals archive ?
proposed multi-trapdoor hash function that allows multiple entities to compute a trapdoor hash collision with a given hash value [20].
The proxy removes some data components from the original set for content downscaling and generates trapdoor hash collision that can authenticate the downscaled multimedia data.
The second experiment [Exp.sup.uncheat.sub.A,Sec-DpoS] is identical to [Exp.sup.uncheat.sub.A,Sec-DpoS] except that the adversary encounters a hash collision. Since H is a random oracle, we have
The third experiment [Exp.sup.unforge,3.sub.A,Sec-DpoS] is identical to [Exp.sup.unforge,2.sub.A,Sec-DpoS] except that the adversary encounters a hash collision. Since H is a random oracle, we have
Double hashing is also used to avoid the hash collision with different set of value position on the test and training samples.
A, C, G, or T), which will dramatically mitigate the possibility of hash collision.
However, the use of bit state hashing will reduce the accuracy of the outcome because a state could be mistakenly reported as visited due to a hash collision and is therefore not stored in the hash array.
While improbable, a hash collision is a real statistical risk.
Through the analysis of the [21] and its related code, we found three types of query errors in [KSC17], called losing of partial coefficient error (LPCE), hash collision error (HCE), and coefficient combination error (CCE), and made some improvements as follows.
This attack is expected to find a hash collision i.e.
Yin, "Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions," in Advances in Cryptology, vol.