<p><span class="h-card" translate="no"><a href="https://furry.engineer/@soatok" class="u-url mention">@<span>soatok</span></a></span> d&#39;you happen to know of any prominent or interesting works relating to devising abuse-resistant non-cryptographic hash functions (i.e. the type used for generating object hashcodes for fast lookups, sorting, etc.)</p><p>specifically thinking of the threat model where someone intentionally constructs data that triggers pathological performance cases in an attempt to cause resource exhaustion. I&#39;ve definitely seen folks discuss this before, just can&#39;t recall where.</p>
Reply