This hashing algorithm is intended to be a high performance, (hardware specific), keyed hash function.
This can be seen as a DOS resistant alternative to
FxHash, or a fast equivalent to
It provides a high speed hash algorithm, but where the result is not predictable without knowing a Key.
This allows it to be used in a
HashMap without allowing for the possibility that an malicious user can
induce a collision.
aHash uses the hardware AES instruction on x86 processors to provide a keyed hash function. It uses two rounds of AES per hash. So it should not be considered cryptographically secure.