hash   8649

« earlier    

so what do you guys do with the 25-45u stuff??? : BubbleHash
just wondering the best usage for the 25u bag claim (with a 45u above)...and what it contains
hash  extract 
10 days ago by aliksd
Cryptographic Hashing in R
de-identify ??

df$uid <- map_chr(df$User, digest, algo = "md5")
df$User <- NULL
userid  anonymize  digest  md5  sha  hash 
10 days ago by bikesandbooks
aappleby/smhasher: Automatically exported from code.google.com/p/smhasher
Automatically exported from code.google.com/p/smhasher - aappleby/smhasher
hash  hashing  algorithms  c  Programming 
12 days ago by vrobin
Fowler–Noll–Vo hash function - Wikipedia
Fowler–Noll–Vo is a non-cryptographic hash function created by Glenn Fowler, Landon Curt Noll, and Kiem-Phong Vo.

The basis of the FNV hash algorithm was taken from an idea sent as reviewer comments to the IEEE POSIX P1003.2 committee by Glenn Fowler and Phong Vo in 1991. In a subsequent ballot round, Landon Curt Noll improved on their algorithm. In an email message to Landon, they named it the Fowler/Noll/Vo or FNV hash.[1]
algorithms  algo  cs  computer-science  md5  hashing  hash  performant 
12 days ago by vrobin
Which hashing algorithm is best for uniqueness and speed? - Software Engineering Stack Exchange
I tested some different algorithms, measuring speed and number of collisions.

I used three different key sets:

A list of 216,553 English words (in lowercase)
The numbers "1" to "216553" (think ZIP codes, and how a poor hash took down msn.com)
216,553 "random" (i.e. type 4 uuid) GUIDs

For each corpus, the number of collisions and the average time spent hashing was recorded.

I tested:

DJB2a (variant using xor rather than )
FNV-1 (32-bit)
FNV-1a (32-bit)
Murmur2 (32-bit)
hash  cryptography  algorithms  programming  hashing  bestpractices  performance  murmur  md5  sha1 
12 days ago by vrobin
How to View a Certificate Fingerprint as SHA-256, SHA-1 or MD5 using OpenSSL
How to View a Certificate Thumbprint as SHA-256, SHA-1 or MD5 using OpenSSL How to View a Certificate Fingerprint as SHA-256, SHA-1 or MD5 using OpenSSL
openssl  x509  crypto  ssl  certificate  sha1  sha256  hash  fingerprint  commandline  solution 
17 days ago by kme
A comprehensive collection of hash functions, a hash visualiser and some test results [see Mckenzie et al. Selecting a Hashing Algorithm, SP&E 20(2):209-224, Feb 1990] will be available someday. If you just want to have a good hash function, and cannot wait, djb2 is one of the best string hash functions i know. it has excellent distribution and speed on many different sets of keys and table sizes. you are not likely to do better with one of the "well known" functions such as PJW, K&R[1], etc. Also see tpop pp. 126 for graphing hash functions.
algorithms  hash 
24 days ago by mwishek

« earlier    

related tags

'riddled  "fevered  active  address  adobe  algo  algorithm  algorithms  analysis  anonymize  ansible  architecture  article  asparagus  assembly  attack  authentication  bacon  baked  bash  bcrypt  benchmarks  best-practices  bestpractice  bestpractices  bitmap  blacklist  blockchain  boa_prática  breach  breakfast  browser  brunch  build  c++  c  cache  calculator  cash  cdn  certificate  change  cheatsheet  ci  cis3360  clear  cli  collision  command  commandline  commit  comp  comp3911  compute  computer-science  computers  concurrency  container  contributes  cop3503  cors  cracking  crc  cross  crypto  cryptography  cs  cs2  csharp  data_structures  datastructure  decrypt  delete  demo  des  design  development  dhcp  dica  dictionary  digest  directory  dotnet  easy  education  eggs  elixir  encryption  entropy  excel  extract  file  fingerprint  force  form'  from  git  go  golang  gpgpu  gpu  grid  hacking  hash-algorithm  hash-tables  hash_default_value  hashcat  hashcode  hashes  hashing  hashmap  healthy  history  html  idea  important  index  infinite  infosec  ip  java  javascript  jitter's  june  key  library  linux  lowcarb  lsh  mac  makesoon  map  mask  md5  memory  merci  mimikatz  msbuild  mschap  mschapv2  murmur  net-ntlm  nginx  nlp  ntlm  ntlmv1  object  openbsd  opensource  openssl  owasp  particles  password  passwords  pdf  pentest  pentesting  performance  performant  personal_net  premiere:  programming  pwned  racket  random  readlater  recaptcha  recipes  reference  remove  repository  robinhoodhash  ruby  salt  saml  security  seeding  senha  set  sets  sha-512  sha  sha1  sha256  shader  shadow  similarity  software  solution  source  spatial  speed  ssl  storage  stretching  swift  tables  tag  terminal  to  toolkit  tools  torrent  tree  type:tool  unix  useful  userid  utilities  versioning  vision"  vs  webapp  windows  x509  xxh3  xxhash  哈希  算法 

Copy this bookmark: