|
You are here |
my-it-notes.com | ||
| | | | |
www.adamconrad.dev
|
|
| | | | | Follow along with Steven Skiena's Fall 2018 algorithm course applied to the JavaScript language. | |
| | | | |
blog.teamleadnet.com
|
|
| | | | | Finding good hash functions for larger data sets is always challenging. The well know hashes, such as MD5, SHA1, SHA256 are fairly slow wi... | |
| | | | |
notes.volution.ro
|
|
| | | | | About the many types of hash functions, their use-cases, dos and don'ts, with suggestions for currently accepted algorithms. | |
| | | | |
scottarc.blog
|
|
| | | Head's up: This is a blog post about applied cryptography, with a focus on web and cloud applications that encrypt data at rest in a database or filesystem. While the lessons can be broadly applicable, the scope of the post is not. One of the lessons I learned during my time at AWS Cryptography (and... | ||