Answer Posted / ruqsana nazneen
Its a mathematical function for turning the data in a
relatively small integer and that can be used to serve as
index into an array. The value returned by this hash
function is called as hash values, hash codes or hashes.
These hash functions are used to speed up the table look up
or data comparision.
| Is This Answer Correct ? | 5 Yes | 0 No |
Post New Answer View All Answers
What is the secure hash algorithm (sha and sha-1)?
What is Fortezza ?
What if users of RSA run out of distinct primes?
What is the discrete logarithm problem ?
How are certifying authorities susceptible to attack ?
Is cryptography patentable in the U.S.?
Why is Clipper controversial?
What is DNA computing ?
Are elliptic curve cryptosystems secure ?
What is the NSA ?
Can DES be exported from the U.S.?
Are elliptic curve cryptosystems widely used ?
What are LEAFs ?
What are the ITU-T (CCITT) Standards ?
What key management issues are involved in public-key cryptography?