Call by Hash

Hash functions: An empirical comparison (2008)

Scientists find optimal space-time balance for hash tables

Hash tables and preferred locations (the Bender hash table)

evil-nix: a Nix library to download files from the internet without requiring a hash

Lock free hash maps

Hash collisions and exploitations (2019)

Optimizing the pext perfect hash function

Bulk Hash Calculator in C

Automatic Specialization of Hash Functions

Non crypto hash function

Questions about hash.go

Converting Strings to Integers Using Hash, HashCode, and CRC-32 in ColdFusion

Hash Trait Prefix Collision - What does it even mean?

Visualising Extendible Hash Tables

Reversing and Tooling a Signed Request Hash in Obfuscated JavaScript

Maglev Hash: Consistent Hash with Guaranteed Even Distribution.

Hammerspace: Hash-like interface to persistent, concurrent, off-heap storage

Efficient Hash Probes on Modern Processors (2007) [pdf]

Implementing Bitcask, a log-structured hash table

good hash table primes

Building a faster hash table for high performance SQL joins

How to Perform a Counting Using Array and Hash Table

Hash matching proposals for the Online Safety Act's implementation are dangerous

BLAKE3 Is an Extremely Fast, Parallel Cryptographic Hash (2020)

“Useless Ruby sugar”: Keyword argument and hash values omission

Must-know hash initialization tricks in Ruby

Hash a boxed trait?

A tale of Java Hash Tables

Hash Based Trees and Tries

More →