|
You are here |
lemire.me | ||
| | | | |
tashian.com
|
|
| | | | | The story of a major hash table vulnerability, and how it took a decade to uncover and resolve. | |
| | | | |
benhoyt.com
|
|
| | | | | Describes a simple Markov chain algorithm to generate reasonable-sounding but utterly nonsensical text, and presents some example outputs as well as a Python implementation. | |
| | | | |
ticki.github.io
|
|
| | | | | These are my thoughts on designing fast, high-quality non-cryptographic hash functions. | |
| | | | |
qsantos.fr
|
|
| | | [AI summary] The article discusses the security implications of client-side password hashing, arguing that it can be secure when combined with memory-hard functions and proper implementation. | ||