Explore >> Select a destination


You are here

blog.cryptographyengineering.com
| | notes.volution.ro
16.3 parsecs away

Travel
| | About the many types of hash functions, their use-cases, dos and don'ts, with suggestions for currently accepted algorithms.
| | soatok.blog
13.4 parsecs away

Travel
| | Programmers don't understand hash functions, and I can demonstrate this to most of the people that will read this with a single observation: When you saw the words "hash function" in the title, you might have assumed this was going to be a blog post about password storage. (Passwords are the most common knee-jerk reaction...
| | cronokirby.com
12.5 parsecs away

Travel
| | - Read more: https://cronokirby.com/posts/2023/06/a-sketch-of-synthetic-cryptography/
| | blog.cryptographyengineering.com
76.3 parsecs away

Travel
| Update 6/10: Based on a short conversation with an engineering lead at X, some of the devices used at X are claimed to be using HSMs. See more further below. Matthew Garrett has a nice post about Twitter (uh, X)'s new end-to-end encryption messaging protocol, which is now called XChat. The TL;DR of Matthew's post...