Content deleted Content added
ce |
Tags: Reverted repeated addition of external links by non-autoconfirmed user Visual edit |
||
Line 81:
===Applicability===
A hash function that allows only certain table sizes, strings only up to a certain length, or can't accept a seed (i.e. allow double hashing) isn't as useful as one that does.
A hash function is applicable in a variety of situations. Particularly within cryptography, notable applications include:<ref>{{Citation |last1=Wagner |first1=Urs |title=Hash Functions |date=2023 |work=Trends in Data Protection and Encryption Technologies |pages=21–24 |editor-last=Mulder |editor-first=Valentin |place=Cham |publisher=Springer Nature Switzerland |language=en |doi=10.1007/978-3-031-33386-6_5 |isbn=978-3-031-33386-6 |last2=Lugrin |first2=Thomas |editor2-last=Mermoud |editor2-first=Alain |editor3-last=Lenders |editor3-first=Vincent |editor4-last=Tellenbach |editor4-first=Bernhard|doi-access=free }}</ref>
|