Paul Eggert <egg...@cs.ucla.edu> writes:

> On 08/06/10 01:22, Paolo Bonzini wrote:
>> ISAAC is a RNG, so wouldn't that have the same problem above?  You
>> definitely need to use a hash function, it's just that you do not need a
>> cryptographic one.
>
> I had been thinking of using ISAAC by making the key its seed, and
> asking it to generate some random values, and then comparing the
> random values.  Any RNG can be used (or abused :-) in this way.
>
> I just now tried, that, though, and discovered that on my million line
> benchmark the MD5 method is about 4 times faster than the ISAAC-based
> method.  So that idea was not a good one.  I suppose we could try a
> non-cryptographic hash function at some point.

I suspect FNV or Xorshift would be faster, since they are so simple:

http://en.wikipedia.org/wiki/Fowler_Noll_Vo_hash
http://en.wikipedia.org/wiki/Xorshift

/Simon



Reply via email to