- Bloom filter: How to avoid performance issues with search
- Simhash: How to detect similar texts
- Hash + salt: How to store sensitive data
- Proof-of-work: How to create your own proof-of-work test
- Simple Diffie-Hellman key exchange example
- Simple RSA example
- HMAC with MD5 reference implementation