Hacker News
- Fun with Cryptographic Hash Functions and PBKDF1-Like Constructions https://soatok.blog/2020/05/05/putting-the-fun-in-hash-function/ 2 comments
- Hash function performance http://scripting.com/stories/2010/09/09/hashFunctionPerformance.html 19 comments
- Bagwell: Fast Functional Lists, Hash-Lists, Deques and Variable Length Arrays http://infoscience.epfl.ch/record/64410/files/techlists.pdf 4 comments scheme
- Which hashing function is good enough for session IDs? https://cheatsheetseries.owasp.org/cheatsheets/Session_Management_Cheat_Sheet.html#session-id-properties 17 comments askprogramming
- constexpr perfect hash functions with gperf https://www.reddit.com/r/cpp/comments/hife4d/constexpr_perfect_hash_functions_with_gperf/ 7 comments cpp
- Intro To General Purpose Hash Functions https://www.partow.net/programming/hashfunctions/idx.html 8 comments programming
- Intro To General Purpose Hash Functions https://www.partow.net/programming/hashfunctions/idx.html 5 comments compsci
- Abusing File System functions in web applications - steal NTLMv2 hash http://www.mannulinux.org/2020/03/abusing-file-system-functions-in-web.html 8 comments netsec
- Stealing NTLMv2 hash using SQL injection in File download functionality http://www.mannulinux.org/2020/01/stealing-ntlmv2-hash-by-abusing-sqlinjection.html 23 comments netsec
- Where can I find test vectors for rfc8018 (PBKDF2 with different hash functions)? https://www.reddit.com/r/crypto/comments/abv007/where_can_i_find_test_vectors_for_rfc8018_pbkdf2/ 11 comments crypto
- memo.cash will adopt the anti-split plan to protect users and allow the app to function no matter which chain wins the hash battle https://twitter.com/memobch/status/1059628876257681408 35 comments btc
- Advent #3 - Minimal Perfect Hash Functions https://blog.gopheracademy.com/advent-2017/mphf/ 7 comments golang
- Laravel 4x with Confide can I change the password encryption hashing function? https://www.reddit.com/r/laravel/comments/74d3tw/laravel_4x_with_confide_can_i_change_the_password/ 3 comments laravel
- Cryptographic vulnerabilities in cryptocurrency IOTA - custom hash function has practical collisions https://medium.com/@neha/cryptographic-vulnerabilities-in-iota-9a6a9ddc4367 4 comments netsec
- Link between discrete logarithm problem and hash functions. https://www.reddit.com/r/crypto/comments/6tg2xw/link_between_discrete_logarithm_problem_and_hash/ 7 comments crypto
- Learn how to use Message Digest aka hashing functions in Java, along with some use cases https://www.veracode.com/blog/research/message-digests-aka-hashing-functions 3 comments java
- How are hashing functions created? https://www.reddit.com/r/askscience/comments/69a6j4/how_are_hashing_functions_created/ 8 comments askscience
- Creating a hash function for pair of pair and int for unordered_map https://www.reddit.com/r/cpp/comments/5lrrzl/creating_a_hash_function_for_pair_of_pair_and_int/ 10 comments cpp
- Creating a hash function in c++ for pair of pair and int https://www.reddit.com/r/learnprogramming/comments/5lrpdy/creating_a_hash_function_in_c_for_pair_of_pair/ 5 comments learnprogramming
- When the developer responsible for implementing crypto doesn't understand hash functions whatsoever https://www.reddit.com/r/sysadmin/comments/5iiaqe/when_the_developer_responsible_for_implementing/ 37 comments sysadmin
- Non-cryptographic fast hash function tests http://aras-p.info/blog/2016/08/09/more-hash-function-tests/ 7 comments rust
- More Hash Function Tests http://aras-p.info/blog/2016/08/09/more-hash-function-tests/ 3 comments programming
- Resources about perfect hash functions http://cmph.sourceforge.net/ 4 comments compsci
- [Beginner] Cryptographic hash functions in Elixir; generating hex digests http://www.djm.org.uk/cryptographic-hash-functions-elixir-generating-hex-digests-md5-sha1-sha2/ 6 comments elixir
- Simple hash function using the digits of pi? http://en.wikipedia.org/wiki/Normal_number 12 comments crypto
- Hash functions: An empirical comparison http://www.strchr.com/hash_functions 3 comments programming
- Bloom Filters and Hash Functions in Go (Implementation+Benchmark) http://zhen.org/blog/benchmarking-bloom-filters-and-hash-functions-in-go/ 6 comments golang
- Breaking a Toy Hash Function. http://twistedoakstudios.com/blog/post4706_breaking-a-toy-hash-function 3 comments crypto
- Breaking a Toy Hash Function http://twistedoakstudios.com/blog/post4706_breaking-a-toy-hash-function 153 comments programming
- Two Basic Hash Functions in Go https://gist.github.com/chase-san/5556547 5 comments golang
- New developments in password hashing: ROM-port-hard functions (building upon the ideas of scrypt and security through obesity) http://www.openwall.com/presentations/zeronights2012-new-in-password-hashing/ 8 comments netsec
- Cryptographic Hash Functions Are Not Password Hash Functions http://throwingfire.com/storing-passwords-securely/?r#notpasswordhashes 429 comments programming
- SipHash: A fast, short-input psuedorandom function for hash tables etc http://131002.net/siphash/ 3 comments netsec
- CityHash: new hash function by Google (faster than Murmur) http://code.google.com/p/cityhash/ 61 comments programming
- SpookyHash: new hash function by Bob Jenkins http://burtleburtle.net/bob/hash/spooky.html 25 comments programming
- Why do hash functions require prime numbers? http://computinglife.wordpress.com/2008/11/20/why-do-hash-functions-use-prime-numbers/ 37 comments compsci
- The Art of the Interpreter or The Modularity Complex. Steele and Sussman hash out the state and modularity questions that we keep seeing in Functional Programming Language discussions. In 1978. http://dspace.mit.edu/handle/1721.1/6094 20 comments programming
- Hash Functions: The Modulo Prime Myth http://www.codexon.com/posts/hash-functions-the-modulo-prime-myth 72 comments programming
- A new form of mathematical attack against a broad range of cryptographic ciphers, including hash functions (such as MD5, SHA-256) has been presented at the Crypto 2008 conference http://www.computerworld.com.au/index.php/id;1395888957%20;fp;16;fpid;1 43 comments technology
- [Computing] When a hacker gains access to a site's database (with the intent to crack passwords), do they also gain access to the hashing function? https://www.reddit.com/r/askscience/comments/516p1u/computing_when_a_hacker_gains_access_to_a_sites/ 10 comments askscience