Hashcode is a result of applying a hash function to data, usually an integer.

learn more… | top users | synonyms

3
votes
2answers
45 views

Finding a pair of words from two files with a particular MD5

I have two txt files. Both contain 60k+ words in a list. I put together some code to loop through each file and concatenate the strings ...
5
votes
2answers
834 views

What’s the largest MD5 hash you can find?

I got inspired by Doorknob's blog post What’s the largest MD5 hash you can find? to get my hands dirty and learn some Python. After playing around with the code from that post, I decided to rewrite ...
2
votes
1answer
423 views

Implementing the Hashable Protocol in Swift with the DJB hash function

A while back I made a custom String struct (see github repo) because of the difficulties in dealing with Mongolian Unicode rendering when using Swift String or ...
3
votes
1answer
190 views

Hash function for strings

Implementation of a hash function in java, haven't got round to dealing with collisions yet. I tried to use good code, refactored, descriptive variable names, nice syntax. My code must be efficient ...
5
votes
1answer
77 views

Image duplicate finder

I have a bunch of exact-duplicate pictures that I've acquired over the years. I'd like to create a list of all them so I can eventually delete some. My idea was simple: dump the hash and location of ...
2
votes
2answers
74 views

A hash-signature-type which tests on comparing against normal strings

I decided to throw this together today figuring it would be cool to add to my repertoire. Before we always had performed this "task" externally. Find the value we want to compare, hash it and compare ...
1
vote
1answer
60 views

Wrapper class for adding elements to HashSet

I have many object of class Test. I want to be sure that among them, there are no two objects o1 and ...
1
vote
1answer
72 views

Java hashcode without using the Object#hashCode method

For an assignment I have to make a HashTable using double hashing, but for the hashing part I am not allowed to use ...
2
votes
1answer
48 views

Harnessing hashCode as JAXB @XmlID in order to use it with @XmlIDREF

I have a class Fighter in a software for planning boxing events. I implemented its hashCode() and ...
2
votes
2answers
77 views

Java hashCode method in VB.NET

The point of this method is to emulate Java hashCode(). In order for this to work the project must have arithmetic overflow allowed under: project --> compiler ...
5
votes
1answer
2k views

Checking for differences between two (large) files

I want to write a relatively simple program, that can backup files from my computer to a remote location and encrypt them in the process, while also computing a diff (well not really...I'm content ...
0
votes
1answer
45 views

Hashing an arbitrary object to a sparse array of bits

I have this method in one of the java classes I'm working on (an implementation of a counting bloom filter): ...
6
votes
1answer
97 views

One way encoding a password

I wrote a script that one way encrypts a user's password by generating a key, and multiplies by the ASCII value of the character and the ASCII value of the key character at (the position that the ...
5
votes
1answer
203 views

Implementation of the FNV-1a hash algorithm for 128-, 256-, 512- and 1024-bit

A little over a year ago, I asked this question. Since then, I've implemented the larger bit variations and am looking for any and all feedback - performance is obviously key when talking about ...
3
votes
2answers
3k views

Encrypting and decrypting passwords in PHP

I am wanting to encrypt a password and decrypt a password using PHP. Is this a safe method? ...
4
votes
1answer
143 views

Truncate 160-bit output from SHA-1 to 64-bit uint64_t

I'd like to truncate 160-bit output from SHA-1 to receive a (weaker) 64-bit digest. It has been a while since I did the type of low-level C pointer arithmetic in the but-last line. Could you please ...
3
votes
1answer
80 views

Find files with similar contents

I'm not normally a C programmer but thought I'd take a shot at making something useful. This is a C utility I wrote to judge how similar several files are using the algorithm I think ...
4
votes
2answers
380 views

Pairing anagrams in a string list

The task was to check for pairs of anagrams in a string list. I first sorted all the words. and looped over the letters. The interview continues with a follow-up, to do the same with limited memory. ...
5
votes
2answers
520 views

Hash Binary Tree Map

I made a map based on a binary tree ordered by hashcodes, with collisions fixed with equals(). Are there any improvements I could make? ...
5
votes
0answers
101 views

Fowler–Noll–Vo hash function in Lua

I recently coded this FNV-1a hash function in Lua. Are there any apparent performance improvements that could be implemented? ...
7
votes
1answer
4k views

Merge two linked list

Given two linkedlist, merge them. Looking for code review, optimizations and best practices. The code is influenced by feedback here. Changes incorporated were: Linkedlist is no-longer write-only ...
7
votes
1answer
220 views

Enhancing speed of looping cycle using Freepascal

I use Lazarus 1.2.4 and Freepascal 2.6.4. I have created a program that reads a disk in buffers of 64Kb (tried various buffer sizes) using a repeat...until loop. Each buffer is hashed using the SHA1 ...
4
votes
1answer
455 views

Generating random and secure CSRF tokens

I googled around for secure random number generation and random string generation, combining them with some user data. Is this good or am I totally off-base? I don't know much about cryptography but ...
5
votes
1answer
74 views

Eliminating repetitiveness in code to test hash functions

I usually take my school code as a playground to mess around with things. I was given a bunch of premade hash functions and had to test their output and find when they reach a specific lower range. ...
10
votes
2answers
1k views

Override equals() and hashCode() using reflection

I wrote a utility method to override equals() using reflection. This works fine, but I wonder if this code will pass all the tests. ...
1
vote
1answer
161 views

Is this a good practice of password salt/hash? [closed]

Original: http://www.php.net/manual/en/function.crypt.php#114060 I've removed the original author's comments to give you a quick glance at the code. Visit the link for detailed explanations of each ...
2
votes
1answer
145 views

Hashing a password

Does this look like a good method to hash a user password? I'm not very familiar with how this whole hashing process works and below is a bunch of stuff I've seen on many different posts. My main ...
4
votes
1answer
57 views

A PHP Toolkit of some functions

Any major security risks? And please don't get angry over my novice log system. ...
5
votes
1answer
2k views

Implementation of the FNV-1a hash algorithm for 32- and 64-bit

Are there any improvements to these two classes which implement FNV-1a for hashing? Particularly, I'm looking for any reuse opportunities (possibly via a common abstract superclass derived from ...
4
votes
3answers
308 views

Anything wrong with this equals and hashCode implementation?

The below is the domain class called WordType which has Id as its unique DB generated value and Name and Description as other values. I was going through the 'Effective Java' resource by Joshua ...
2
votes
2answers
210 views

Computing hash of string

I want my code to be reviewed and I'd like to hear your opinions. Sun's code to compute hash of string: ...
2
votes
3answers
280 views

Retrieving current time and computing a hash value

Can someone critique this Java code? ...