occurs, the code simply appends the value to the list in the target slot. This
(or other) search to find the specific value.
of the algorithm you use or to improve its performance. Apart from cryptographic
CHAPTER 7
Arranging and Searching Data
151
uses (which deserve a book alone), Chapter 12 presents common algorithms that
leverage different hash functions, such as the Bloom Filter, the HyperLogLog, and
the Count-Min Sketch, that leverage the properties of custom hash functions to
extract information from huge amounts of data.
You can find many examples of different hash functions in the Python
hashlib
package. The
hashlib
package contains algorithms such as these:
Do'stlaringiz bilan baham: