| ▲ | josefx 5 hours ago | |
> The first requirement for safe hashtable implementations is a secret key, Some languages use different approaches. The buckets in a Java HashMap turn into a sorted tree if they grow too large. Then there are trivial solutions like adding an input limit for untrusted users. Either way works, is secure and doesn't depend on a secret key. | ||