Hacker News with Generative AI: Hash Functions

Entropy Attacks (cr.yp.to)
The conventional wisdom is that hashing more entropy sources can't hurt: if H is any modern cryptographic hash function then H(x,y,z) is at least as good a random number as H(x,y), no matter how awful z is. So we pile one source on top of another, hashing them all together and hoping that at least one of them is good.
Questioning the Criteria for Evaluating Non-Cryptographic Hash Functions (cacm.acm.org)
Computing practitioners encounter hash functions almost every day, although they may not necessarily be the center of attention.
ChibiHash: Small, Fast 64 bit hash function (nrk.neocities.org)
If you need a small and fast 64 bit hash function that can be copy-pasted easily, then here's one that I cooked up in an hour or so: chibihash64.h.
ChibiHash: Small, Fast 64 bit hash function (nrk.neocities.org)
If you need a small and fast 64 bit hash function that can be copy-pasted easily, then here's one that I cooked up in an hour or so: chibihash64.h.
Breaking CityHash64, MurmurHash2/3, wyhash, and more (orlp.net)
Hash functions are incredibly neat mathematical objects. They can map arbitrary data to a small fixed-size output domain such that the mapping is deterministic, yet appears to be random.
Questioning the Criteria for Evaluating Non-Cryptographic Hash Functions (queue.acm.org)
Computing practitioners encounter hash functions almost every day, although they may not necessarily be the center of attention.
Th64: Tiny Hash Function in C (github.com/tidwall)