A linked list traversal system identifies when a linked list has become
inefficient, either through attack or an undue multiplicity of
collisions. A data unit is parsed to extract a key. A first hash result
associated with the key is calculated based on a first hash function. A
first linked list is identified based on the first hash result. It is
determined whether the first linked list has been compromised. A second
hash result associated with the key is calculated based on a second hash
function when the first linked list has been compromised. A second linked
list is established based on the second hash result, where the second
hash result is different from the first hash result.