Explore >> Select a destination


You are here

orlp.net
| | danlark.org
2.6 parsecs away

Travel
| | When it comes to hashing, sometimes 64 bit is not enough, for example, because of birthday paradox -- the hacker can iterate through random $latex 2^{32}$ entities and it can be proven that with some constant probability they will find a collision, i.e. two different objects will have the same hash. $latex 2^{32}$ is around...
| | blog.teamleadnet.com
4.4 parsecs away

Travel
| | Finding good hash functions for larger data sets is always challenging. The well know hashes, such as MD5, SHA1, SHA256 are fairly slow wi...
| | xoranth.net
1.8 parsecs away

Travel
| |
| | cookie.engineer
25.7 parsecs away

Travel
| Linux Assembly Part 1: Syscalls