Hacker News
- Fun with Cryptographic Hash Functions and PBKDF1-Like Constructions https://soatok.blog/2020/05/05/putting-the-fun-in-hash-function/ 2 comments
- The BLAKE3 cryptographic hash function https://github.com/BLAKE3-team/BLAKE3 104 comments
- Hash function performance http://scripting.com/stories/2010/09/09/hashFunctionPerformance.html 19 comments
Lobsters
- Programmers Don’t Understand Hash Functions https://soatok.blog/2021/08/24/programmers-dont-understand-hash-functions/ 41 comments cryptography
- Cracking a weak hash function https://qmemcpy.io/post/cracking-a-weak-hash-function 2 comments cryptography
- Bagwell: Fast Functional Lists, Hash-Lists, Deques and Variable Length Arrays http://infoscience.epfl.ch/record/64410/files/techlists.pdf 4 comments scheme
- Which hashing function is good enough for session IDs? https://cheatsheetseries.owasp.org/cheatsheets/Session_Management_Cheat_Sheet.html#session-id-properties 17 comments askprogramming
- Compile time hash functions https://github.com/abbbaf/Compile-time-hash-functions 11 comments cpp
- constexpr perfect hash functions with gperf https://www.reddit.com/r/cpp/comments/hife4d/constexpr_perfect_hash_functions_with_gperf/ 7 comments cpp
- Intro To General Purpose Hash Functions https://www.partow.net/programming/hashfunctions/idx.html 8 comments programming
- Intro To General Purpose Hash Functions https://www.partow.net/programming/hashfunctions/idx.html 5 comments compsci
- Abusing File System functions in web applications - steal NTLMv2 hash http://www.mannulinux.org/2020/03/abusing-file-system-functions-in-web.html 8 comments netsec
- Stealing NTLMv2 hash using SQL injection in File download functionality http://www.mannulinux.org/2020/01/stealing-ntlmv2-hash-by-abusing-sqlinjection.html 23 comments netsec
- Where can I find test vectors for rfc8018 (PBKDF2 with different hash functions)? https://www.reddit.com/r/crypto/comments/abv007/where_can_i_find_test_vectors_for_rfc8018_pbkdf2/ 11 comments crypto
- memo.cash will adopt the anti-split plan to protect users and allow the app to function no matter which chain wins the hash battle https://twitter.com/memobch/status/1059628876257681408 35 comments btc
- Advent #3 - Minimal Perfect Hash Functions https://blog.gopheracademy.com/advent-2017/mphf/ 7 comments golang
- Laravel 4x with Confide can I change the password encryption hashing function? https://www.reddit.com/r/laravel/comments/74d3tw/laravel_4x_with_confide_can_i_change_the_password/ 3 comments laravel
- Cryptographic vulnerabilities in cryptocurrency IOTA - custom hash function has practical collisions https://medium.com/@neha/cryptographic-vulnerabilities-in-iota-9a6a9ddc4367 4 comments netsec
- Link between discrete logarithm problem and hash functions. https://www.reddit.com/r/crypto/comments/6tg2xw/link_between_discrete_logarithm_problem_and_hash/ 7 comments crypto
- Learn how to use Message Digest aka hashing functions in Java, along with some use cases https://www.veracode.com/blog/research/message-digests-aka-hashing-functions 3 comments java
- How are hashing functions created? https://www.reddit.com/r/askscience/comments/69a6j4/how_are_hashing_functions_created/ 8 comments askscience
- Creating a hash function for pair of pair and int for unordered_map https://www.reddit.com/r/cpp/comments/5lrrzl/creating_a_hash_function_for_pair_of_pair_and_int/ 10 comments cpp
- Creating a hash function in c++ for pair of pair and int https://www.reddit.com/r/learnprogramming/comments/5lrpdy/creating_a_hash_function_in_c_for_pair_of_pair/ 5 comments learnprogramming
- When the developer responsible for implementing crypto doesn't understand hash functions whatsoever https://www.reddit.com/r/sysadmin/comments/5iiaqe/when_the_developer_responsible_for_implementing/ 37 comments sysadmin
- Non-cryptographic fast hash function tests http://aras-p.info/blog/2016/08/09/more-hash-function-tests/ 7 comments rust
- More Hash Function Tests http://aras-p.info/blog/2016/08/09/more-hash-function-tests/ 3 comments programming
- [Beginner] Cryptographic hash functions in Elixir; generating hex digests http://www.djm.org.uk/cryptographic-hash-functions-elixir-generating-hex-digests-md5-sha1-sha2/ 6 comments elixir
- Simple hash function using the digits of pi? http://en.wikipedia.org/wiki/Normal_number 12 comments crypto
- Hash functions: An empirical comparison http://www.strchr.com/hash_functions 3 comments programming
- Breaking a Toy Hash Function. http://twistedoakstudios.com/blog/post4706_breaking-a-toy-hash-function 3 comments crypto
- Breaking a Toy Hash Function http://twistedoakstudios.com/blog/post4706_breaking-a-toy-hash-function 153 comments programming
- Two Basic Hash Functions in Go https://gist.github.com/chase-san/5556547 5 comments golang
- New developments in password hashing: ROM-port-hard functions (building upon the ideas of scrypt and security through obesity) http://www.openwall.com/presentations/zeronights2012-new-in-password-hashing/ 8 comments netsec
- Cryptographic Hash Functions Are Not Password Hash Functions http://throwingfire.com/storing-passwords-securely/?r#notpasswordhashes 429 comments programming
- SipHash: A fast, short-input psuedorandom function for hash tables etc http://131002.net/siphash/ 3 comments netsec
- Why do hash functions require prime numbers? http://computinglife.wordpress.com/2008/11/20/why-do-hash-functions-use-prime-numbers/ 37 comments compsci
- The Art of the Interpreter or The Modularity Complex. Steele and Sussman hash out the state and modularity questions that we keep seeing in Functional Programming Language discussions. In 1978. http://dspace.mit.edu/handle/1721.1/6094 20 comments programming
- A new form of mathematical attack against a broad range of cryptographic ciphers, including hash functions (such as MD5, SHA-256) has been presented at the Crypto 2008 conference http://www.computerworld.com.au/index.php/id;1395888957%20;fp;16;fpid;1 43 comments technology
- [Computing] When a hacker gains access to a site's database (with the intent to crack passwords), do they also gain access to the hashing function? https://www.reddit.com/r/askscience/comments/516p1u/computing_when_a_hacker_gains_access_to_a_sites/ 10 comments askscience
- Introducing Bao, a general-purpose cryptographic tree hash, and perhaps the fastest hash function in the world [my talk at the Rust NYC meetup] https://youtu.be/Dya9c2DXMqQ 35 comments rust