First data structures/algorithms book covering hash tables + when they became common

GPU powered low MD5 hash finder

Show HN: A portable hash map in C

Feedback - Cyberbro - Analyze observable (IP, hash, domain) with ease - (CTI Cybersecurity project)

Help figuring out hash function issue

Building a Secure Hash Utility in Rust with SHA3–256

Java: Tern is a command in-line tool to encrypt and decrypt files using the AES algorithim, implemented in java, also has a special function to compress, encrypt and hash an array of files into one big mono-file, which can also be unwrapped again to get all the files back…

ChibiHash: Small, Fast 64 bit hash function

The SHA-256 hash of this sentence begins with 0573e7473.

I hadn't used Python in a while, but I came back to it to make this CLI hash checking script