Explore >> Select a destination


You are here

www.integralist.co.uk
| | paragonie.com
1.6 parsecs away

Travel
| | A human-readable overview of commonly misused cryptography terms and fundamental concepts.
| | www.cesarsotovalero.net
2.8 parsecs away

Travel
| | This article delves into symmetric and asymmetric encryption, as the building blocks of Public Key Infrastructure (PKI). It describes how PKI allows safeguarding the authenticity and security of digital communications across the internet.
| | dgroshev.com
1.4 parsecs away

Travel
| | [AI summary] The author discusses the challenges and solutions for implementing a secure, privacy-preserving BitTorrent connectivity testing tool using cryptographic techniques like asymmetric encryption and HMAC to protect user IP addresses.
| | rcoh.me
21.2 parsecs away

Travel
| Few data-structures are more ubiquitous in real-world development than the hash table. Nearly every major programming features an implementation in its standard library or built into the runtime. Yet, there is no conclusive best strategy to implement one and the major programming languages diverge widely in their implementations! I did a survey of the Hash map implementations in Go, Python, Ruby, Java, C#, C++, and Scala to compare and contrast how they were implemented.