#hashing

2026-02-26

Matrix Hashing uses two hash functions and a 2D array to achieve O(1) lookups with minimal collisions and a small sorted overflow for scalable systems. hackernoon.com/matrix-hashing- #hashing

Turbo Learn PHPTurboLearnPHP
2026-02-18
2026-02-02

Hashing cannot be reversed. Prove me wrong!

YouTube video featuring the amazing Michael Pound: youtu.be/OzVzo9gtiec

#hash #encryption #hashing #vpn #crypto #cryptography #md5 #sha #learn

2026-02-01
PERFECT PANGRAM HASH : Anagram Hash Function

#DOI https://doi.org/10.5281/zenodo.18448042

A pangram is a sentence or phrase that contains each letter of an alphabet or character set at least once. A perfect pangram is an anagram of the alphabet which contains each letter exactly once.

Pangram hash generates a perfect pangram hash digest consisting of a anagram permutation of a character set. Each character in the output is unique and non-repeating.

#Hashing #Cryptography #Anagrams #Papers #Preprints

@cryptography@soc.octade.net @crypto@infosec.pub @cryptography@fed.dyne.org
Chema Alonso :verified:chemaalonso@ioc.exchange
2025-12-17
2025-11-19

Ever thought hashes could paint colors or shape avatars?
In this new Quarkus tutorial, I explore creative uses of Apache Commons Codec — from deterministic color generation to distributed fingerprints.

🔗 the-main-thread.com/p/creative

#Java #Quarkus #ApacheCommons #Hashing #Coding

Austin Huang ❤️austin@mstdn.party
2025-11-12

Can there be a #password #hashing algorithm that considers the distance between each character key on a keyboard (of some specific layout, say QWERTY)? The difficulty of hitting the correct character on a small 26-key on-screen keyboard on my phone is making me think whether we should have a relaxed algorithm that gives some fault tolerance... (Surely it'll not be as secure, but it could allow longer passwords on phones.)

Hacker Newsh4ckernews
2025-11-09
रञ्जित (Ranjit Mathew)rmathew
2025-10-25

Love 😍 such articles that cover a topic in depth:

“Modern Perfect Hashing For Strings” [2023], Wojciech Muła (0x80.pl/notesen/2023-04-30-loo).

On HN: news.ycombinator.com/item?id=3

2025-10-09

Pretty surprised to see that the armv6m optimized Ascon-Hash256 (winner of NISTs lightweight crypto competition) is 3x slower than the standard BLAKE2s reference implementation on a Cortex-M0+ 😲

#hashing #ascon

Philip Zuckersandmouth@types.pl
2025-09-15

[New Blog Post] A Slotted Hash Cons for Alpha Invariance philipzucker.com/slotted_hash_ #hashing #egraph #lambda

Andrea Corbelliniandxor@mstdn.social
2025-09-05

New crate published: crates.io/crates/souphash

SoupHash: an order-independent hash function. Designed to be used for hashing unordered collections, or hashing over multiple threads.

This has not been extensively reviewed, so any kind of feedback is more than welcome!

#RustLang #Crate #Hashing

2025-08-14
2025-07-22

Hashing is an Integrity control that helps ensure data has not been tampered with. It provides a unique digital fingerprint for verification. #Hashing

N-gated Hacker Newsngate
2025-07-03

Ah yes, because the world was desperately incomplete without a way to hash a 25-byte string in merely 68 clock cycles. 😴🔧 Meanwhile, the rest of us are still waiting for the riveting sequel where we parallelize the of parallelizing. 🚀💼
controlpaths.com/2025/06/29/pa

Jan :rust: :ferris:janriemer@floss.social
2025-06-28

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst