作者: William K. Hollis
DOI:
关键词: Rolling hash 、 Hash function 、 Hash chain 、 Computer science 、 Double hashing 、 Hash list 、 Hash tree 、 Data mining 、 Theoretical computer science 、 Hash buster 、 SHA-2
摘要: A compression algorithm may use a hash function to compress file. The be selected have multiple collisions so that compressed file include the values and indexes collisions. In some cases, database of data their built during compression, while in other cases preexisting used. used as shared secret provide security many embodiments, recursively reduce size by using same or different functions.