On Mon, Nov 29, 2010 at 11:12:21AM -0500, der Mouse wrote:
> > If the keys are controlled by a third party, it is very easy to
> > degrade the performance to a linear list.
> 
> Sure, but that's not a useful remark.  It's equally true of (n*K)>>32,
> or for that matter any other easily invertible hash function.  If the
> bucket count is small enough to make guessing feasible for the
> attacker, it's true of any hash function cheap enough to be useful as a
> hash function.

Only if you keep K fixed. If you follow the "rehash with different K on
high number of collissions" scheme, it is resilient to such attacks.

Joerg

Reply via email to