Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔗 Hash Algorithms
Collision Resistance, Performance, Hash Tables, Cryptographic
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
185134
posts in
17.5
ms
Consistent
Hashing
dev.to
·
9h
·
Discuss:
DEV
🏗️
Hash Tables
The
Cryptography
Concept
Journey
medium.com
·
8h
🔗
Hash Functions
Recurrent Private Set Intersection for Unbalanced Databases with
Cuckoo
Hashing and Leveled
FHE
papers.cool
·
1d
🌸
Bloom Indexing
Introduction to
Bloom
Filters
hur.st
·
1d
·
Discuss:
DEV
🌸
Bloom Filters
How to
Hash
Passwords in Python and
Encrypt
Sensitive Data the Right Way
dev.to
·
19h
·
Discuss:
DEV
🔗
Hash Functions
HyBMSearch
: A fast multi-Level search algorithm delivering order-of-Magnitude
speedups
on multi-Billion datasets
sciencedirect.com
·
1d
🔍
Search Algorithms
The
Math
Behind the Match: Building Production Search for People
Names
hackernoon.com
·
8h
🔤
String Algorithms
Hashing
: What It Is and Why It
Matters
medium.com
·
4d
🔗
Hash Functions
The
185-Microsecond
Type
Hint
blog.sturdystatistics.com
·
6h
·
Discuss:
Lobsters
,
Hacker News
,
r/programming
⚡
Interpreter Optimization
NSHEDB
: Noise-Sensitive
Homomorphic
Encrypted Database Query Engine
arxiv.org
·
23h
🔗
Hash Functions
How to Check 10 Million
Usernames
in Under 1
Millisecond
github.com
·
1d
·
Discuss:
DEV
🌸
Bloom Filters
Show HN: Break past
cryptography
in
seconds
stateofutopia.com
·
1d
·
Discuss:
Hacker News
🔗
Hash Functions
Data
Structures
and
Algorithms
Introduction
hellointerview.com
·
3d
🪢
Rope Data Structures
Efficient and
Portable
Mixture-of-Experts
Communication
research.perplexity.ai
·
7h
📋
JSON Parsing
An extension of Z-numbers with
consensus
credibility
: Theory and applications
sciencedirect.com
·
1d
🌸
Bloom Filters
How to
efficiently
learn the
necessary
tools and methods _around_ programming itself?
en.wikipedia.org
·
9h
·
Discuss:
r/learnprogramming
📐
Mathematical Computing
Seeking Advice on Crypto Recovery Through Digital
Asset
Forensics
news.ycombinator.com
·
1h
·
Discuss:
Hacker News
🔓
Decompilers
MineShark
:
Cryptomining
Traffic Detection at Scale
papers.cool
·
1d
📊
Profiling
How HTTPS Works -
TLS
1.3
Handshake
& Encryption Visual Guide
toolkit.whysonil.dev
·
6h
·
Discuss:
r/programming
,
r/webdev
🔗
Hash Functions
komrad36/CRC
: Fastest
CRC32
for x86, Intel and AMD, + comprehensive derivation and discussion of various approaches
github.com
·
1d
📦
Compact Data
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help