You can use a family of hash functions and seed the hash table instance with a key.
The attacker won't be able to do make assumptions regarding collisions because he doesn't have access to the initial key.
You can use a family of hash functions and seed the hash table instance with a key.
The attacker won't be able to do make assumptions regarding collisions because he doesn't have access to the initial key.