Description

Zero-allocation, pretty fast implementations of non-cryptographic hash functions for byte sequences or blocks of memory

Vulnerabilities

No vulnerabilities detected

Sign up and see:

Detailed component information including:
  • Version history
  • Declared licenses
  • Vulnerability details
Sign Up