|
You are here |
words.filippo.io | ||
| | | | |
blog.cr.yp.to
|
|
| | | | | ||
| | | | |
educatedguesswork.org
|
|
| | | | | ||
| | | | |
durumcrustulum.com
|
|
| | | | | A living document on how to juggle these damned things. What's a KEM? A KEM is a Key Encapsulation Mechanism, a cryptographic primitive that has a KeyGen(... | |
| | | | |
my-it-notes.com
|
|
| | | Few observations in regards to hash usage, in projects where data volume and spikes in load shift engineering from the KISS paradigm to the extent where you have to really care about underlying technologies and data structures. There are different hash functions tailored for different use cases - quick pattern matching in Rabin-Karp algorithm, prefix ... | ||