Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔗 Hash Algorithms
Collision Resistance, Performance, Hash Tables, Cryptographic
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
83241
posts in
627.2
ms
Adaptive
Hashing
: Faster Hash Functions with Fewer
Collisions
arxiv.org
·
1d
·
Discuss:
Hacker News
🔗
Hash Functions
High‑Performance Cryptographic Hash Function Based on
Mersenne
Prime Field Arithmetic and Efficient Modular Reduction **Abstract**
Mersenne
primes
\(p=2^q-1\...
freederia.com
·
2d
🔗
Hash Functions
Telling the Story of
Chameleon
Hash
Functions: A 27-Year Review
eprint.iacr.org
·
3d
🔗
Hash Functions
Top
Authentication
Techniques
to Build Secure Applications
blog.bytebytego.com
·
1d
🔗
Hash Functions
Sharding
Databases with Spring Boot: Patterns,
Pitfalls
, and Failure Modes
dev.to
·
1d
·
Discuss:
DEV
💾
Minimal Databases
Free online
toolbox
with 50+ useful tools – no ads, no
signup
required
strongtools.site
·
1h
·
Discuss:
r/SideProject
✨
Code Formatters
Building "zero-gap"
secrets
for a
UGC
platform
news.ycombinator.com
·
15h
·
Discuss:
Hacker News
🔗
Hash Functions
Time-Complexity Characterization of
NIST
Lightweight
Cryptography
Finalists
arxiv.org
·
1d
🔗
Hash Functions
Privacy-preserving data analysis using a
memristor
chip with
colocated
authentication and processing
science.org
·
1d
🏷️
Memory Tagging
I
struggled
with system design until I learned these 114
concepts
newsletter.systemdesign.one
·
2h
🗄️
Database Engines
*Quantum‑Resistant Cryptographic Hash Functions Based on the
Colored
Jones Polynomial of
Knots
*
freederia.com
·
2d
🔗
Hash Functions
Hello Edge: Keyword
Spotting
on
Microcontrollers
dev.to
·
19h
·
Discuss:
DEV
🏷️
Memory Tagging
Constrained parallel
tempering
in
traveling-salesman
problems with circular neighborhoods
link.aps.org
·
5h
⏭️
Skip Lists
mstrYoda/goraphdb
: A graph database implemented in Golang
github.com
·
21h
·
Discuss:
r/programming
🗃️
Query Compilation
CySecurity News - Latest Information Security and Hacking Incidents: Unsecured Database Exposes 149 Million
Logins
Linked to
Infostealer
Malware Operations
cysecurity.news
·
54m
·
Discuss:
Blogger
🔐
Security Types
Nonlinear random walks on
hypergraphs
characterized
by higher-order interactions
sciencedirect.com
·
45m
🧮
Combinator Calculus
Engineering
Ethereum
's Speed: How we made
Ethrex
20x faster
blog.lambdaclass.com
·
3d
⚡
Performance
Hamming
Distance for Hybrid Search in
SQLite
notnotp.com
·
2d
💾
Minimal Databases
AI Can
Easily
Crack Your
Passwords
– Tips to Create Strong
Passwords
maketecheasier.com
·
1d
🔗
Hash Functions
First
Proof
| Research-Level
Math
for AI Evaluation
1stproof.org
·
1d
·
Discuss:
Hacker News
🧩
Constraint Solvers
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help