| 1. | Using two hash functions offers substantial benefits over a single hash function.
|
| 2. | More efficient attacks are possible by employing cryptanalysis to specific hash functions.
|
| 3. | This approach is secure assuming the hash function is a random oracle.
|
| 4. | Using two hash functions offers substantial benefits over a single hash function.
|
| 5. | Assume that a hash function selects each array position with equal probability.
|
| 6. | Do any known cryptographic hash functions run in less than linear time?
|
| 7. | Passing the output through a simple hash function can remedy this weakness.
|
| 8. | Suppose you choose a fast and cryptographically secure random hash function.
|
| 9. | Even with good hash functions, load factors are normally limited to 80 %.
|
| 10. | Given a query point, the algorithm iterates over the hash functions.
|