- SHA-3 questions https://en.wikipedia.org/wiki/SHA-3#Design 45 comments crypto
- Has the NIST controversy totally stalled SHA3? http://en.wikipedia.org/wiki/SHA-3#NIST_announcement_controversy 46 comments crypto
Linking pages
- Why Google is Hurrying the Web to Kill SHA-1 https://konklone.com/post/why-google-is-hurrying-the-web-to-kill-sha-1 391 comments
- GitHub - avaneev/prvhash: PRVHASH - Pseudo-Random-Value Hash. Hash functions, PRNG with unlimited period, randomness extractor, and a glimpse into abyss. (inline C/C++) (Codename Gradilac/Градилак) https://github.com/avaneev/prvhash#proof_math_is_engineered 127 comments
- Email explained from first principles https://explained-from-first-principles.com/email/ 109 comments
- At death’s door for years, widely used SHA1 function is now dead | Ars Technica https://arstechnica.com/security/2017/02/at-deaths-door-for-years-widely-used-sha1-function-is-now-dead/ 49 comments
- The Ethereum Virtual Machine — How does it work? | by Luit Hollander | MyCrypto | Medium https://medium.com/mycrypto/the-ethereum-virtual-machine-how-does-it-work-9abac2b7c9e 32 comments
- GitHub - tunjos/java-crypto-utils: Java Cryptographic, Encoding and Hash Utilities https://github.com/tunjos/java-crypto-utils 25 comments
- Generating Ethereum address from scratch · TomAF http://afiodorov.github.io/2019/06/18/elliptic/ 21 comments
- GitHub - RustCrypto/hashes: Collection of cryptographic hash functions written in pure Rust https://github.com/RustCrypto/hashes 19 comments
- Password auth in Rust, from scratch - Attacks and best practices | Luca Palmieri https://www.lpalmieri.com/posts/password-authentication-in-rust/ 18 comments
- Butterback - because you want your btrfs volume back https://www.rubdos.be/2021/06/11/butterback.html 17 comments
- GitHub - samuel-lucas6/Cryptography-Guidelines: Guidance on implementing cryptography as a developer. https://github.com/samuel-lucas6/Cryptography-Guidelines 16 comments
- UMASH: a fast and universal enough hash - Backtrace Engineering https://engineering.backtrace.io/2020-08-24-umash-fast-enough-almost-universal-fingerprinting/ 11 comments
- Hashing Apples, Bananas and Cherries | Pascal Junod https://crypto.junod.info/posts/recursive-hash/ 10 comments
- WebIdentity: One-click passwordless signups TITLEamp; logins https://espadrine.github.io/blog/posts/webidentity.html 8 comments
- Why Do We Need Transaction Data?. The “data” field exists for all… | by Maarten Zuidhoorn | MyCrypto | Medium https://medium.com/mycrypto/why-do-we-need-transaction-data-39c922930e92 7 comments
- Coin Metrics’ State of the Network: Issue 204 https://coinmetrics.substack.com/p/state-of-the-network-issue-204 5 comments
- Maybe don't use Blake3 on Short Inputs - Joseph Szymborski has a Blog. https://jszym.com/blog/short_input_hash/ 5 comments
- cruzbit: A simple decentralized peer-to-peer ledger | by asdvxgxasjab | Medium https://medium.com/@asdvxgxasjab/cruzbit-a-simple-decentralized-peer-to-peer-ledger-2944495b6129 4 comments
- Using cryptography for tamper-proof election results after close of polling https://lisper.in/cryptography-election-results 3 comments
- Cryptography in .NET - Meziantou's blog https://www.meziantou.net/cryptography-in-dotnet.htm 3 comments
Would you like to stay up to date with Computer science? Checkout Computer science
Weekly.
Related searches:
Search whole site: site:en.wikipedia.org
Search title: SHA-3 - Wikipedia
See how to search.