Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Jämförelse av icke-kryptografiska hashfunktionerför användning i hashtabeller
KTH, School of Computer Science and Communication (CSC).
KTH, School of Computer Science and Communication (CSC).
2014 (Swedish)Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesisAlternative title
Comparison of non-cryptographic hashfunctions for use in hash tables (English)
Abstract [en]

This report examines some common or otherwise interestingnon-cryptographic hash functions with respect to the number of collisions when used in hash tables for different types of hashkeys. The report answers which of the examined hash functions can be seen as the best performing for the chosen hashkeys. To compare the different hash functions, an experiment which studies avalanche effect behaviour is carried out. The experiments also calculate the fraction of colliding hashkeys, and the distribution of hashkeys in hash tables is studied using Karl Pearson’schi-squared test. The results indicate that SpookyHash is the best performing hash function for the chosen hashkeys.

Abstract [sv]

Denna rapport undersöker hur några vanliga eller annars intressanta icke-kryptografiska hashfunktioner presterar i hashtabeller med avseende på antal kollisioner för olika typerav nyckelvärden. Med hjälp av denna jämförelse besvaras frågan om vilken av de undersökta hashfunktionerna som kan anses vara genomsnittligt bäst för utvalda typerav nyckelvärden. För att jämföra de olika hashfunktionerna utförs experiment där så kallad avalanche effect studeras. Även andel kolliderande nyckelvärden beräknas, och fördelningen av nyckelvärden i hashtabeller studeras med hjälp av Karl Pearsons chi-två-test för utvalda datatyper. Baserat på resultaten framhålls med viss försiktighet Spooky Hashsom den bäst presterande av de utvalda hashfunktionerna för utvalda nyckelvärden.

Place, publisher, year, edition, pages
2014.
National Category
Computer Science
Identifiers
URN: urn:nbn:se:kth:diva-157404OAI: oai:DiVA.org:kth-157404DiVA: diva2:769881
Examiners
Available from: 2014-12-09 Created: 2014-12-09 Last updated: 2014-12-09Bibliographically approved

Open Access in DiVA

fulltext(800 kB)69 downloads
File information
File name FULLTEXT01.pdfFile size 800 kBChecksum SHA-512
fb9bdcbf42d6e5f9fd62254800cb4ca376cbe05d904b79414bd9e2391793158ebca09f85536eeea816fd39ab2ae66401e57f668e2a087e3bf3fab906fcfeb249
Type fulltextMimetype application/pdf

By organisation
School of Computer Science and Communication (CSC)
Computer Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 69 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 377 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf