<p><span class="h-card" translate="no"><a href="https://furry.engineer/@soatok" class="u-url mention">@<span>soatok</span></a></span> d'you happen to know of any prominent or interesting works relating to devising abuse-resistant non-cryptographic hash functions (i.e. the type used for generating object hashcodes for fast lookups, sorting, etc.)</p><p>specifically thinking of the threat model where someone intentionally constructs data that triggers pathological performance cases in an attempt to cause resource exhaustion. I've definitely seen folks discuss this before, just can't recall where.</p>