Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🏹 Robin Hood Hashing
Hash Tables, Open Addressing, Variance Reduction, Linear Probing
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
76549
posts in
586.4
ms
Adaptive
Hashing
: Faster Hash Functions with Fewer
Collisions
arxiv.org
·
1d
·
Discuss:
Hacker News
#️⃣
Hash Tables
*Quantum‑Resistant Cryptographic Hash Functions Based on the
Colored
Jones Polynomial of
Knots
*
freederia.com
·
2d
⚖️
Consistent Hashing
Telling the Story of
Chameleon
Hash
Functions: A 27-Year Review
eprint.iacr.org
·
3d
🐦
Cuckoo Hashing
marzhall/BBL
: A couple of tools for
OpenEdge
ABL
github.com
·
13h
🎯
Lance
Stop
Storing
Passwords
Like It's 1999: The Node.js + MySQL Reality Check
dev.to
·
10h
·
Discuss:
DEV
🔒
Rustls
Nonlinear random walks on
hypergraphs
characterized
by higher-order interactions
sciencedirect.com
·
2h
🕸️
Graph Theory
MicroBlaze
MCS Seven-Segment Counter on
Basys
3 FPGA
hackster.io
·
1h
🏗
Computer Architecture
19
Shades
of
LockBit
5.0, Inside the Latest Cross-Platform Ransomware: Part 3
levelblue.com
·
1d
🔐
Hardware Security
Constrained parallel
tempering
in
traveling-salesman
problems with circular neighborhoods
link.aps.org
·
7h
📮
Multi-producer Queues
Neural Bitcoin Small Class
Number
Attack
leetarxiv.substack.com
·
2d
·
Discuss:
Substack
🐦
Cuckoo Hashing
The
Beacon
is
lit
blog.zarfhome.com
·
2h
⚡
LMAX Disruptor
Explainer
:
XPC
eclecticlight.co
·
9h
🔐
Capability Systems
Bitcoin
Optech
Newsletter
#391
bitcoinops.org
·
1d
💼
Thrift
I Solved an
OhSint
TryHackMe
Challenge as a Beginner — Here’s Everything I learned
medium.com
·
1h
🔓
Binary Exploitation
Detecting Phishing Patterns with Python: An
Architect
's
Pragmatic
Approach
dev.to
·
3d
·
Discuss:
DEV
🦠
Malware Analysis
Building "zero-gap"
secrets
for a
UGC
platform
news.ycombinator.com
·
16h
·
Discuss:
Hacker News
#️⃣
Perfect Hashing
CySecurity News - Latest Information Security and Hacking Incidents: Unsecured Database Exposes 149 Million
Logins
Linked to
Infostealer
Malware Operations
cysecurity.news
·
2h
·
Discuss:
Blogger
🔒
Security
Privacy-preserving data analysis using a
memristor
chip with
colocated
authentication and processing
science.org
·
1d
🏷️
Memory Tagging
Chromosome-level genome assembly and annotation of the critically endangered
Siberian
crane (
Leucogeranus
leucogeranus
)
nature.com
·
1h
🧬
Computational Biology
Deterministic Retrieval at Scale: Optimal-Space
LCP
Indexing
and 308x Energy Reduction on Modern GPUs
arxiv.org
·
1d
🚀
Milvus
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help