Hacker News new | past | comments | ask | show | jobs | submit login

Using chosen hash functions in your applications isn't so rare even outside cryptography field. For example I often use hash for storage addressing (ala git). For this kind of thing you need something fast and with practically no collision (which isn't a requirement for a common hash table).



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: