[Cryptography] Bloom filter question
Peter Gutmann
pgut001 at cs.auckland.ac.nz
Mon Aug 4 20:31:16 EDT 2025
Jon Callas <jon at callas.org> writes:
>On the other end of the scale, there's hash tables, where collisions are
>normal and expected.
It depends on how you're using the hash table, if it's to process attacker-
controlled data like in a packet filter than you can't afford collisions
where an attacker can turn your fast lookup into a slow linear search.
Peter.
More information about the cryptography
mailing list