 
      
    | You are here | blog.cryptographyengineering.com | ||
| | | | | notes.volution.ro | |
| | | | | About the many types of hash functions, their use-cases, dos and don'ts, with suggestions for currently accepted algorithms. | |
| | | | | soatok.blog | |
| | | | | Programmers don't understand hash functions, and I can demonstrate this to most of the people that will read this with a single observation: When you saw the words "hash function" in the title, you might have assumed this was going to be a blog post about password storage. (Passwords are the most common knee-jerk reaction... | |
| | | | | cronokirby.com | |
| | | | | - Read more: https://cronokirby.com/posts/2023/06/a-sketch-of-synthetic-cryptography/ | |
| | | | | blog.cryptographyengineering.com | |
| | | Update 6/10: Based on a short conversation with an engineering lead at X, some of the devices used at X are claimed to be using HSMs. See more further below. Matthew Garrett has a nice post about Twitter (uh, X)'s new end-to-end encryption messaging protocol, which is now called XChat. The TL;DR of Matthew's post... | ||