Explore >> Select a destination


You are here

blog.cryptographyengineering.com
| | notes.volution.ro
11.9 parsecs away

Travel
| | About the many types of hash functions, their use-cases, dos and don'ts, with suggestions for currently accepted algorithms.
| | soatok.blog
12.1 parsecs away

Travel
| | Programmers don't understand hash functions, and I can demonstrate this to most of the people that will read this with a single observation: When you saw the words "hash function" in the title, you might have assumed this was going to be a blog post about password storage. (Passwords are the most common knee-jerk reaction...
| | cronokirby.com
10.3 parsecs away

Travel
| | - Read more: https://cronokirby.com/posts/2023/06/a-sketch-of-synthetic-cryptography/
| | circleid.com
36.0 parsecs away

Travel
| The Internet has evolved from a scarcity-driven system into one defined by abundance, reshaping infrastructure, governance, and economic models while challenging long-held assumptions about addressing, network roles, and the future of protocol design.