smhasher VS .NET Runtime

Compare smhasher vs .NET Runtime and see what are their differences.

smhasher

Hash function quality and speed tests (by rurban)

.NET Runtime

.NET is a cross-platform runtime for cloud, mobile, desktop, and IoT apps. (by dotnet)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
smhasher .NET Runtime
30 608
1,703 14,139
- 1.6%
6.7 10.0
2 days ago 6 days ago
C++ C#
GNU General Public License v3.0 or later MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

smhasher

Posts with mentions or reviews of smhasher. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-11-19.
  • GxHash - A new (extremely) fast and robust hashing algorithm 🚀
    2 projects | /r/rust | 19 Nov 2023
    The algorithm passes all SMHasher quality tests and uses rounds of AES block cipher internally, so it is quite robust! For comparison XxH3, t1ha0 and many others don't pass SMHasher (while being slower).
  • The PolymurHash universal hash function
    2 projects | news.ycombinator.com | 18 Aug 2023
    Confirmed, I tested it. https://github.com/rurban/smhasher
  • Show HN: Discohash – simply, quality, fast hash
    3 projects | news.ycombinator.com | 23 Jun 2023
    There's lots of great hash functions out there: some are super fast, like xxhash and highly optimized, others are also super fast umash and based on interesting math ideas from finite fields^1, while maintaining high quality (according to SMHasher). Others are also fast and interesting (tabulation hash, that may sometimes be seemingly universal), one of the main originators of those ideas are Mikkel Thorup^2. Anyway, a couple of years ago I also tried my hand at building hashes and created a few that passed SMHasher (tifuhash ~ a floating point hash, beamsplitter - a seemingly-universal tabulation style hash, and this one discohash - a "more traditional" ARX-based design (addition rotation xor)^3 ).

    0: https://github.com/rurban/smhasher/blob/master/xxh3.h

    1: https://pvk.ca/Blog/2022/12/29/fixing-hashing-modulo-alpha-e...

    2: https://arxiv.org/abs/1505.01523

    3: https://eprint.iacr.org/2018/898.pdf https://crypto.polito.it/content/download/480/2850/file/docu...

    4: https://en.wikipedia.org/wiki/BLAKE_(hash_function)

    Discohash (posted here) is the fastest one I made, it's simple and doesn't rely on any arch-specific optimizations or vector instructions (AVX etc ~ tho I suppose...they could be added? I'm definitely no expert in them, I barely get away with doing the C/C++ implementations!)

    The main mixing round function is:

      mix(const int A) {
  • A Vulnerability in Implementations of SHA-3, Shake, EdDSA
    2 projects | news.ycombinator.com | 7 Mar 2023
    ubsan, asan, valgrind tests are missing. some do offer symbolic verification of the algo, but not the implementations.

    See my https://github.com/rurban/smhasher#crypto paragraph, and

  • Academic Urban Legends
    1 project | news.ycombinator.com | 6 Mar 2023
    The spinach story reminds me a lot on the false recommendation of siphash for hash table DDOS prevention. https://github.com/rurban/smhasher#security

    The authors came up in their widely cited paper with a proper solution to spread the random hash seed into the inner loop, vastly enhancing its security by avoiding trivial hash collision attacks. But a secure, slow hash function can never prevent from normal hash seed attacks, when the random seed is known somehow. esp. with dynamic languages it's trivial to get the seed externally.

    Other trivial countermeasures must be used then, which also don't make hash tables 10x slower, keeping them practical.

  • SHA-1 is out. NIST recommends switching to the SHA-2 and SHA-3 groups of hash algorithms as soon as possible, with an official deadline of Dec. 31, 2030.
    1 project | /r/netsec | 16 Dec 2022
  • Adventures in Advent of Code
    6 projects | news.ycombinator.com | 3 Dec 2022
  • New ScyllaDB Go Driver: Faster Than GoCQL and Its Rust Counterpart
    6 projects | news.ycombinator.com | 13 Oct 2022
    This is the best, most comprehensive hash test suite I know of: https://github.com/rurban/smhasher/

    you might want to particularly look into murmur, spooky, and metrohash. I'm not exactly sure of what the tradeoffs involved are, or what your need is, but that site should serve as a good starting point at least.

  • What do you typically use for non-cryptographic hash functions?
    2 projects | /r/golang | 3 Oct 2022
    Here is a good comparison table, as you can see, BLAKE can perform in secure way much faster than crc32, so my original point, - to use non weak hashes unless you really have a reason/requirement not to do so
  • What hash function you use for hash maps / hash tables?
    3 projects | /r/gameenginedevs | 2 Oct 2022
    smhasher is a great place to testing results for a massive number of hash algorithms.

.NET Runtime

Posts with mentions or reviews of .NET Runtime. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-04-22.
  • Airline keeps mistaking 101-year-old woman for baby
    1 project | news.ycombinator.com | 28 Apr 2024
    It's an interesting "time is a circle" problem given that a century only has 100 years and then we loop around again. 2-digit years is convenient for people in many situations but they are very lossy, and horrible for machines.

    It reminds me of this breaking change to .Net from last year.[1][2] Maybe AA just needs to update .Net which would pad them out until the 2050's when someone born in the 1950s would be having...exactly the same problem in the article. (It is configurable now so you could just keep pushing it each decade, until it wraps again).

    Or they could use 4-digit years.

    [1] https://github.com/dotnet/runtime/issues/75148

  • The software industry rapidly convergng on 3 languages: Go, Rust, and JavaScript
    1 project | news.ycombinator.com | 24 Apr 2024
    These can also be passed as arguments to `dotnet publish` if necessary.

    Reference:

    - https://learn.microsoft.com/en-us/dotnet/core/deploying/nati...

    - https://github.com/dotnet/runtime/blob/main/src/coreclr/nati...

    - https://github.com/dotnet/runtime/blob/5b4e770daa190ce69f402... (full list of recognized keys for IlcInstructionSet)

  • The Performance Impact of C++'s `final` Keyword
    6 projects | news.ycombinator.com | 22 Apr 2024
    Yes, that is true. I'm not sure about JVM implementation details but the reason the comment says "virtual and interface" calls is to outline the difference. Virtual calls in .NET are sufficiently close[0] to virtual calls in C++. Interface calls, however, are coded differently[1].

    Also you are correct - virtual calls are not terribly expensive, but they encroach on ever limited* CPU resources like indirect jump and load predictors and, as noted in parent comments, block inlining, which is highly undesirable for small and frequently called methods, particularly when they are in a loop.

    * through great effort of our industry to take back whatever performance wins each generation brings with even more abstractions that fail to improve our productivity

    [0] https://github.com/dotnet/coreclr/blob/4895a06c/src/vm/amd64...

    [1] https://github.com/dotnet/runtime/blob/main/docs/design/core... (mind you, the text was initially written 18 ago, wow)

  • Java 23: The New Features Are Officially Announced
    5 projects | news.ycombinator.com | 17 Apr 2024
    If you care about portable SIMD and performance, you may want to save yourself trouble and skip to C# instead, it also has an extensive guide to using it: https://github.com/dotnet/runtime/blob/69110bfdcf5590db1d32c...

    CoreLib and many new libraries are using it heavily to match performance of manually intensified C++ code.

  • Locally test and validate your Renovate configuration files
    4 projects | dev.to | 9 Apr 2024
    DEBUG: packageFiles with updates (repository=local) "config": { "nuget": [ { "deps": [ { "datasource": "nuget", "depType": "nuget", "depName": "Microsoft.Extensions.Hosting", "currentValue": "7.0.0", "updates": [ { "bucket": "non-major", "newVersion": "7.0.1", "newValue": "7.0.1", "releaseTimestamp": "2023-02-14T13:21:52.713Z", "newMajor": 7, "newMinor": 0, "updateType": "patch", "branchName": "renovate/dotnet-monorepo" }, { "bucket": "major", "newVersion": "8.0.0", "newValue": "8.0.0", "releaseTimestamp": "2023-11-14T13:23:17.653Z", "newMajor": 8, "newMinor": 0, "updateType": "major", "branchName": "renovate/major-dotnet-monorepo" } ], "packageName": "Microsoft.Extensions.Hosting", "versioning": "nuget", "warnings": [], "sourceUrl": "https://github.com/dotnet/runtime", "registryUrl": "https://api.nuget.org/v3/index.json", "homepage": "https://dot.net/", "currentVersion": "7.0.0", "isSingleVersion": true, "fixedVersion": "7.0.0" } ], "packageFile": "RenovateDemo.csproj" } ] }
  • Chrome Feature: ZSTD Content-Encoding
    10 projects | news.ycombinator.com | 1 Apr 2024
    https://github.com/dotnet/runtime/issues/59591

    Support zstd Content-Encoding:

  • Writing x86 SIMD using x86inc.asm (2017)
    3 projects | news.ycombinator.com | 26 Mar 2024
  • Why choose async/await over threads?
    11 projects | news.ycombinator.com | 25 Mar 2024
    We might not be that far away already. There is this issue[1] on Github, where Microsoft and the community discuss some significant changes.

    There is still a lot of questions unanswered, but initial tests look promising.

    Ref: https://github.com/dotnet/runtime/issues/94620

  • Redis License Changed
    11 projects | news.ycombinator.com | 20 Mar 2024
    https://github.com/dotnet/dotnet exists for source build that stitches together SDK, Roslyn, runtime and other dependencies. A lot of them can be built and used individually, which is what contributors usually do. For example, you can clone and build https://github.com/dotnet/runtime and use the produced artifacts to execute .NET assemblies or build .NET binaries.
  • Garnet – A new remote cache-store from Microsoft Research
    6 projects | news.ycombinator.com | 18 Mar 2024
    Yeah, it kind of is. There are quite a few of experiments that are conducted to see if they show promise in the prototype form and then are taken further for proper integration if they do.

    Unfortunately, object stack allocation was not one of them even though DOTNET_JitObjectStackAllocation configuration knob exists today, enabling it makes zero impact as it almost never kicks in. By the end of the experiment[0], it was concluded that before investing effort in this kind of feature becomes profitable given how a lot of C# code is written, there are many other lower hanging fruits.

    To contrast this, in continuation to green threads experiment, a runtime handled tasks experiment[1] which moves async state machine handling from IL emitted by Roslyn to special-cased methods and then handling purely in runtime code has been a massive success and is now being worked on to be integrated in one of the future version of .NET (hopefully 10?)

    [0] https://github.com/dotnet/runtime/issues/11192

    [1] https://github.com/dotnet/runtimelab/blob/feature/async2-exp...

What are some alternatives?

When comparing smhasher and .NET Runtime you can also consider the following projects:

xxHash - Extremely fast non-cryptographic hash algorithm

Ryujinx - Experimental Nintendo Switch Emulator written in C#

wyhash - The FASTEST QUALITY hash function, random number generators (PRNG) and hash map.

ASP.NET Core - ASP.NET Core is a cross-platform .NET framework for building modern cloud-based web applications on Windows, Mac, or Linux.

BLAKE3 - the official Rust and C implementations of the BLAKE3 cryptographic hash function

actix-web - Actix Web is a powerful, pragmatic, and extremely fast web framework for Rust.

Hashids.java - Hashids algorithm v1.0.0 implementation in Java

WASI - WebAssembly System Interface

png-decoder - A pure-Rust, no_std compatible PNG decoder

CoreCLR - CoreCLR is the runtime for .NET Core. It includes the garbage collector, JIT compiler, primitive data types and low-level classes.

rustls - A modern TLS library in Rust

vgpu_unlock - Unlock vGPU functionality for consumer grade GPUs.