Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔗 Hash Algorithms
Collision Resistance, Performance, Hash Tables, Cryptographic
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
83097
posts in
298.8
ms
Adaptive
Hashing
: Faster Hash Functions with Fewer
Collisions
arxiv.org
·
1d
·
Discuss:
Hacker News
🔗
Hash Functions
Performance Tip of the Week #26: Fixing things with
hashtable
profiling
abseil.io
·
5h
🔗
Hash Functions
How To Go
Slow
artima.com
·
5h
⏭️
Skip Lists
We have
broken
SHA-1
in practice
shattered.io
·
7h
·
Discuss:
Hacker News
🔗
Hash Functions
High‑Performance Cryptographic Hash Function Based on
Mersenne
Prime Field Arithmetic and Efficient Modular Reduction **Abstract**
Mersenne
primes
\(p=2^q-1\...
freederia.com
·
2d
🔗
Hash Functions
Telling the Story of
Chameleon
Hash
Functions: A 27-Year Review
eprint.iacr.org
·
3d
🔗
Hash Functions
Top
Authentication
Techniques
to Build Secure Applications
blog.bytebytego.com
·
2d
🔗
Hash Functions
I built a
cryptographic
memory layer for humans in Python tags: python,
opensource
, security, blockchain
dev.to
·
5h
·
Discuss:
DEV
🏷️
Memory Tagging
Free online
toolbox
with 50+ useful tools – no ads, no
signup
required
strongtools.site
·
13h
·
Discuss:
r/SideProject
✨
Code Formatters
Human-like Search for Modern
Applications
anvitra.ai
·
55m
·
Discuss:
Hacker News
🔍
Search Algorithms
Early History of a Perfect Join
Algorithm
remy.wang
·
5h
📈
Query Optimization
How many
known
passwords
do you have?
discuss.privacyguides.net
·
4h
🔗
Hash Functions
Building "zero-gap"
secrets
for a
UGC
platform
news.ycombinator.com
·
1d
·
Discuss:
Hacker News
🔗
Hash Functions
Performance Tip of the Week #83:
Reducing
memory
indirections
abseil.io
·
5h
💾
Cache Algorithms
Time-Complexity Characterization of
NIST
Lightweight
Cryptography
Finalists
arxiv.org
·
1d
🔗
Hash Functions
philipl/pifs
:
πfs
- the data-free filesystem!
github.com
·
11h
·
Discuss:
Hacker News
🔄
Deduplication
Sharding
Databases with Spring Boot: Patterns,
Pitfalls
, and Failure Modes
dev.to
·
2d
·
Discuss:
DEV
💾
Minimal Databases
*Quantum‑Resistant Cryptographic Hash Functions Based on the
Colored
Jones Polynomial of
Knots
*
freederia.com
·
2d
🔗
Hash Functions
When Clever Hardware Hacks Bite Back: A Password
Keeper
Device
Autopsy
hackaday.com
·
3h
🏷️
Memory Tagging
Privacy-preserving data analysis using a
memristor
chip with
colocated
authentication and processing
science.org
·
1d
🏷️
Memory Tagging
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help