Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔗 Hash Algorithms
Collision Resistance, Performance, Hash Tables, Cryptographic
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
80250
posts in
238.8
ms
Adaptive
Hashing
: Faster Hash Functions with Fewer
Collisions
arxiv.org
·
4d
·
Discuss:
Hacker News
🔗
Hash Functions
Signing JSON Web
Tokens
: Algorithm
Tradeoffs
, Performance, and Security
ciamweekly.substack.com
·
22h
·
Discuss:
Substack
🔗
Hash Functions
Performance Tip of the Week #26: Fixing things with
hashtable
profiling
abseil.io
·
2d
🔗
Hash Functions
Towards a Standard for
JSON
Document
Databases
muratbuffalo.blogspot.com
·
13h
·
Discuss:
Blogger
📊
Query Optimizers
Don't pass on small block
ciphers
00f.net
·
13h
🔗
Hash Functions
The
OWASP
LLM Top: A Practical Attack Guide (with 122 real attack
techniques
)
news.ycombinator.com
·
27m
·
Discuss:
Hacker News
🛡️
Security Type Systems
Main
Content ||
Math
∩ Programming
jeremykun.com
·
1d
🔢
Algebraic Datatypes
Unique
identifiers
privacy.ca.gov
·
6h
🔗
Hash Functions
the
mathematics
of
compression
in database systems
bitsxpages.com
·
17h
📦
Compression Algorithms
Faster
than
Dijkstra
?
systemsapproach.org
·
1d
·
Discuss:
Hacker News
💾
Cache-Oblivious Algorithms
E2EE
Backend part 1:
Homomorphic
Encryption
peterspath.net
·
19h
·
Discuss:
Hacker News
🔗
Hash Functions
The
Immutable
Ledger
: Data Integrity Through TypeScript & Design Patterns
dev.to
·
9h
·
Discuss:
DEV
📡
Protocol Buffers
Building a Scalable
URL
Shortener
github.com
·
1h
·
Discuss:
DEV
⚡
Incremental Parsing
A
Proof
of P =
NP
dev.to
·
1d
·
Discuss:
DEV
🎨
Graph Coloring
Mastering
Authentication
in MCP: An AI Engineer’s Comprehensive Guide
pub.towardsai.net
·
1d
🔗
Hash Functions
How To Go
Slow
artima.com
·
2d
⏭️
Skip Lists
Re-Identification
vs
Anonymization
Strength
testingbranch.com
·
2d
·
Discuss:
Hacker News
🛡️
Security Type Systems
We have
broken
SHA-1
in practice
shattered.io
·
2d
·
Discuss:
Hacker News
🔗
Hash Functions
Fibonacci
numbers and time-space
tradeoffs
johndcook.com
·
1d
🎯
Bit Vectors
High‑Performance Cryptographic Hash Function Based on
Mersenne
Prime Field Arithmetic and Efficient Modular Reduction **Abstract**
Mersenne
primes
\(p=2^q-1\...
freederia.com
·
4d
🔗
Hash Functions
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help