We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
There is a widespread belief that a cryptographicly secure hash is needed. See: https://github.com/rurban/smhasher/blob/master/README.md#security
Beyond what is already documented in https://github.com/tkaitchuck/aHash/wiki/Attacking-aHash-or-why-it's-good-enough-for-a-hashmap There should a wiki page should be created to explain:
The text was updated successfully, but these errors were encountered:
Should explain why standing up to impossible differential crypto analysis is not actually required.
It would also be good to walk through differential crypto analysis to show why input cancelation does not work on aHash.
Sorry, something went wrong.
Done: https://github.com/tkaitchuck/aHash/wiki/How-aHash-is-resists-DOS-attacks
tkaitchuck
No branches or pull requests
There is a widespread belief that a cryptographicly secure hash is needed. See: https://github.com/rurban/smhasher/blob/master/README.md#security
Beyond what is already documented in https://github.com/tkaitchuck/aHash/wiki/Attacking-aHash-or-why-it's-good-enough-for-a-hashmap
There should a wiki page should be created to explain:
The text was updated successfully, but these errors were encountered: