-
Create / Manage bucket ID by creating a consistent hash of the incoming key(s)
-
We should have a proper algorithm for hashing of ints and other things. We should probably aim for something DoS resistant too.
Conversation started in https://github.com/actonlang/acton/pull/992#i…
-
**Describe the feature:**
To be considered FIPS compliant only certain hashing algorithms can be used.
It is tedious to manually search the codebase for usages of `createHash('md5')` to create a…
-
### Search first
- [X] I searched and no similar issues were found
### Description
To comply with regional security requirements, namely the United States Federal Information Processing Standard (F…
-
Hey,
The documentation mentions consistent hashing as one of the LB algorithm but there is no config option for `hash-balance-factor` to support bounded load consistent hashing. Will this feature…
-
CryoNote uses the CryptoNight-Dark hashing algorithm which is optimized for CPU based mining.
# Specifications
* **Memory**: 1
-
-
MD5 is in use in hub/src/server/drivers/diskDriver.ts . MD5 has "collisions" - two separate strings can resolve to the same hash. A good breakdown is https://www.mscs.dal.ca/~selinger/md5collision/ . …
-
`mbtiles` and `martin-cp` [standardize](https://maplibre.org/martin/mbtiles-validation.html#per-tile-validation) how a tile data is hashed in the mbtiles. `tilelive-copy` has been generating [normaliz…
-
The first hashing algorithm I introduced was PBKDF2. This is a good accepted standard. But nowadays there are others that may be better.
[Argon2](https://cryptobook.nakov.com/mac-and-key-derivation…