|
You are here |
blog.perryizgr8.com | ||
| | | | |
pagefault.se
|
|
| | | | | I've been planning on writing a longer series of post about hash functions to learn more about how they work and what goes into designing good hash functions. During my research I stumbled upon something called Locality Sensitive Hashing. If you've used a hash function before or know something about them, you probably know that changing the input to a hash function by just a little bit produces a wildly different result. | |
| | | | |
kevquirk.com
|
|
| | | | | Ever wondered how websites check your password? I mean, how can they check your password without being able to read it? It's a catch 22, surely? | |
| | | | |
mathspp.com
|
|
| | | | | Today I learned that the hash of an integer is the integer itself, except for -21. The hash of -1 is -2. | |
| | | | |
bitslog.com
|
|
| | | This document describes a weakness in Bitcoin Design that reduces the security of SPV proofs and therefore SPV Wallets. The weakness was discovered by me on August 2017, but during the responsable disclosure process I learnt it was previously known by some prominent members of the Bitcoin Core team. Using this weakness an attacker can... | ||