|
You are here |
www.schneier.com | ||
| | | | |
crackstation.net
|
|
| | | | | How to hash passwords properly using salt. Why hashes should be salted and how to use salt correctly. | |
| | | | |
notes.volution.ro
|
|
| | | | | About the many types of hash functions, their use-cases, dos and don'ts, with suggestions for currently accepted algorithms. | |
| | | | |
blog.cryptographyengineering.com
|
|
| | | | | A few weeks ago I ran into a conversation on Twitter about the weaknesses of applied cryptography textbooks, and how they tend to spend way too much time lecturing people about Feistel networks and the boring details of AES. Some of the folks in this conversation suggested that instead of these things, we should be... | |
| | | | |
andreasimonecosta.dev
|
|
| | | Let's try to clarify, once and for all, the true essence of type parameters. | ||