Show HN: I made a C program to create a vanity SHA-1 hash for a text file

New A5HASH 64-bit hash function: ultimate throughput for small key data hash-maps and hash-tables (inline C/C++).

"random art" algorithm for hash visualization

Inserting into a hash map when the value does not exist

Undergraduate shows that searches within hash tables can be much faster

Questioning the Criteria for Evaluating Non-Cryptographic Hash Functions

How hash table works under the hood?

Help me Decrypt SHA256 hash

Examples of quick hash tables and dynamic arrays in C

VMUM - a new fast non-cryptographic hash function

Examples of quick hash tables and dynamic arrays in C

Hash Design and Goodhart's Law

Bitcask: A Log-Structured Hash Table for Fast Key/Value Data (2010)

Why is hash(-1) == hash(-2) in Python?

Hash Functions: Bridging the Gap from Theory to Practice - Mikkel Thorup - Google Algorithms Seminar

FNV Hash Map

Profiling & Cache Conscious Hash Maps

Working with BigUint: Hash Conversion and Compact Representation in Rust

Which Hash function in used in HashMap

Choosing a hash function for 2030 and beyond: SHA2 vs SHA3 vs BLAKE3

A GPU-accelerated MD5 Hash Cracker, written using Rust and CUDA

First data structures/algorithms book covering hash tables + when they became common

GPU powered low MD5 hash finder

Show HN: A portable hash map in C

Feedback - Cyberbro - Analyze observable (IP, hash, domain) with ease - (CTI Cybersecurity project)

Help figuring out hash function issue

Building a Secure Hash Utility in Rust with SHA3–256

Java: Tern is a command in-line tool to encrypt and decrypt files using the AES algorithim, implemented in java, also has a special function to compress, encrypt and hash an array of files into one big mono-file, which can also be unwrapped again to get all the files back…

ChibiHash: Small, Fast 64 bit hash function

The SHA-256 hash of this sentence begins with 0573e7473.

More →