Five* non-cryptographic hash functions enter. One hash function leaves.
Adam Harvey https://linux.conf.au/schedule/30208/view_talk When you say âhash functionâ in a room full of developers, people tend to think of the classics: M...
đĽ Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Pakistan under the topic 'f'.
About this video
Adam Harvey
https://linux.conf.au/schedule/30208/view_talk
When you say âhash functionâ in a room full of developers, people tend to think of the classics: MD5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-OHGODPLEASESTOP, and the like â cryptographic hash functions intended for cryptographic uses.
Thereâs another world out there, though: non-cryptographic hashes. Sometimes you just need to figure out if youâve already seen a string or structure. Sometimes you need a basic checksum. Sometimes you need a hash thatâs just fast and can fit into a 32 bit integer.
Iâll run through the state of the art in the world of non-cryptographic hashing â what your best options are, how they compare in terms of CPU and memory usage, and how they work. Who takes it? Whose mixing function reigns supreme?
Letâs find out.
* Iâm saying âfiveâ, but realistically Iâm going to cover as many modern options as I can fit into the time available. Letâs say âfive plus or minus twoâ in reality.
Video Information
Views
4.7K
Total views since publication
Likes
95
User likes and reactions
Duration
37:31
Video length
Published
Feb 6, 2016
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.