Tagged articles
18 articles
Page 1 of 1
Lin is Dream
Lin is Dream
Mar 12, 2025 · Fundamentals

Unlocking Java’s HashMap: How Hash Functions Power Fast Lookups

This article explains the fundamentals of hash structures, hash functions, and Java collection implementations such as HashMap, LinkedHashMap, and ConcurrentHashMap, covering their design, collision handling, performance characteristics, and how Redis extends these concepts to a distributed environment.

Data StructuresHashMaphash function
0 likes · 12 min read
Unlocking Java’s HashMap: How Hash Functions Power Fast Lookups
Python Programming Learning Circle
Python Programming Learning Circle
Feb 25, 2025 · Fundamentals

Understanding Hash Tables in Python: Concepts, Operations, and Applications

This article explains the fundamentals of hash tables, covering their definition, advantages, core concepts like hash functions and collision resolution, practical Python dictionary usage with code examples, and common application scenarios such as fast look‑ups, frequency counting, and deduplication.

collision-resolutionhash functionhash table
0 likes · 5 min read
Understanding Hash Tables in Python: Concepts, Operations, and Applications
Full-Stack Cultivation Path
Full-Stack Cultivation Path
Jan 2, 2025 · Fundamentals

How Merkle Trees Enable Efficient Data Change Detection

This article explains the principles of Merkle trees, shows how they are built from file hashes, and demonstrates their use for fast data‑change detection in cloud sync, blockchain verification, and P2P file sharing, complete with a Node.js implementation.

BlockchainMerkle TreeNode.js
0 likes · 12 min read
How Merkle Trees Enable Efficient Data Change Detection
Satori Komeiji's Programming Classroom
Satori Komeiji's Programming Classroom
Aug 9, 2024 · Fundamentals

What Makes an Object Hashable in Python and How Is Its Hash Computed?

An object is hashable in Python if it is immutable and implements __eq__, allowing it to serve as a dictionary key; the hash value is normally derived from the object's address unless __hash__ is overridden, and equal objects must share identical hash values, influencing dictionary indexing and collision handling.

custom __eq__custom __hash__dictionary
0 likes · 11 min read
What Makes an Object Hashable in Python and How Is Its Hash Computed?
IT Services Circle
IT Services Circle
May 11, 2024 · Fundamentals

Hash Table Summit: Storage Structure, Collision Resolution, Mapping, and Resizing

An imaginative conference narrates how various programming language implementations—Go's map, C++'s unordered_map, Java's HashMap, Python's dict, and C#'s HashTable—discuss storage structures, collision‑resolution strategies, hash‑to‑index mapping, and initial capacity and resizing policies, highlighting their differing algorithms and trade‑offs.

capacitycollision-resolutionhash function
0 likes · 9 min read
Hash Table Summit: Storage Structure, Collision Resolution, Mapping, and Resizing
Sohu Tech Products
Sohu Tech Products
Oct 12, 2022 · Fundamentals

Understanding the Underlying Principles of Java HashMap

This article explains how Java's HashMap stores key‑value pairs using an array of nodes, how hash functions map keys to array indices, how collisions are handled with linked lists and red‑black trees, and why proper hashCode implementations are crucial for performance.

CollisionData StructureHashMap
0 likes · 20 min read
Understanding the Underlying Principles of Java HashMap
Sohu Tech Products
Sohu Tech Products
Oct 7, 2022 · Fundamentals

Understanding the Underlying Principles of Java HashMap

This article explains how Java's HashMap stores key‑value pairs using an array‑plus‑linked‑list structure, details the hash function, index calculation, collision handling, resizing, and the conditions under which linked lists are replaced by red‑black trees, illustrated with concrete code examples.

CollisionHashMapRed-Black Tree
0 likes · 20 min read
Understanding the Underlying Principles of Java HashMap
Tencent Cloud Developer
Tencent Cloud Developer
Aug 18, 2022 · Fundamentals

Perfect Hash Functions and Their Use in High‑Performance HashMaps

The article explains perfect hash functions, their collision‑free construction methods such as FCH, CHD, and PTHash, compares them to conventional hash tables, reviews common and cryptographic hash functions, and shows how read‑only perfect‑hash maps deliver faster lookups and lower memory use for static key sets.

BenchmarkData Structurealgorithm
0 likes · 21 min read
Perfect Hash Functions and Their Use in High‑Performance HashMaps
Yiche Technology
Yiche Technology
Jul 18, 2022 · Fundamentals

Deep Dive into Go's Map Implementation: Hash Tables, Hash Functions, and Runtime Mechanics

This article provides a comprehensive analysis of Go's map implementation, covering its hash‑table foundation, key type constraints, hash function characteristics, collision resolution strategies, runtime initialization, internal structures like hmap and bmap, and the various operations for creation, access, update, deletion, and resizing.

Data StructuresGoInitialization
0 likes · 21 min read
Deep Dive into Go's Map Implementation: Hash Tables, Hash Functions, and Runtime Mechanics
Python Programming Learning Circle
Python Programming Learning Circle
Apr 7, 2022 · Fundamentals

Understanding Hash Tables and Implementing Them in Python

This article explains the concept of hashing and hash tables, describes their characteristics and collision‑resolution strategies, showcases practical Python implementations with load‑factor handling and resizing, and highlights common applications such as dictionaries and network session tables.

Data StructuresPythoncollision-resolution
0 likes · 13 min read
Understanding Hash Tables and Implementing Them in Python
OPPO Amber Lab
OPPO Amber Lab
Oct 26, 2020 · Information Security

Understanding Core Cryptography Concepts: Public Keys, Digital Signatures, and AEAD

This article introduces essential cryptography fundamentals for programmers, covering public‑key encryption, key‑exchange protocols, digital envelopes, signatures, certificates, hash functions, MACs, and authenticated encryption with associated data, while highlighting practical security considerations.

AEADdigital signaturehash function
0 likes · 5 min read
Understanding Core Cryptography Concepts: Public Keys, Digital Signatures, and AEAD
OPPO Amber Lab
OPPO Amber Lab
Sep 22, 2020 · Information Security

Understanding Cryptography: From Basics to Symmetric & Asymmetric Ciphers

This article introduces the fundamentals of cryptography, explaining what passwords are, the difference between encryption and decryption, classifications of cryptographic algorithms such as symmetric, asymmetric, hash functions, and message authentication, and illustrates concepts with examples like RC4 and block cipher modes.

asymmetric cipherencryptionhash function
0 likes · 5 min read
Understanding Cryptography: From Basics to Symmetric & Asymmetric Ciphers
21CTO
21CTO
Nov 10, 2017 · Information Security

Symmetric vs Asymmetric Encryption: MACs, Signatures & Certificates Explained

This article explains the fundamentals of symmetric and asymmetric encryption, the key distribution challenges they face, how hybrid cryptosystems combine their strengths, and introduces essential cryptographic tools such as hash functions, message authentication codes, digital signatures, and public‑key certificates, comparing their capabilities.

CertificateMacdigital signature
0 likes · 15 min read
Symmetric vs Asymmetric Encryption: MACs, Signatures & Certificates Explained
Baidu Tech Salon
Baidu Tech Salon
Sep 4, 2014 · Information Security

Understanding MD5: Hash Function vs Encryption and the Importance of Mathematical Thinking in Programming

MD5 is a one‑way hash, not an encryption method, and its 128‑bit output cannot be mathematically reversed; understanding this requires solid algorithmic and mathematical foundations, which the author argues are essential for programmers alongside broader theoretical knowledge rather than relying on mere trial‑and‑error experience.

MD5collision attackcryptography
0 likes · 7 min read
Understanding MD5: Hash Function vs Encryption and the Importance of Mathematical Thinking in Programming