- Confused about SHA-512 round constants https://en.wikipedia.org/wiki/SHA-2#Pseudocode 4 comments learnprogramming
- [C] Implenting SHA256, where do I start? http://en.wikipedia.org/wiki/SHA-2#Pseudocode 5 comments learnprogramming
Linking pages
- Ethereum’s “Merge” is about to put every ether miner out of work | Ars Technica https://arstechnica.com/tech-policy/2022/08/the-merge-the-biggest-change-in-ethereum-history-explained/ 2407 comments
- Why Google is Hurrying the Web to Kill SHA-1 https://konklone.com/post/why-google-is-hurrying-the-web-to-kill-sha-1 391 comments
- A from-scratch tour of Bitcoin in Python https://karpathy.github.io/2021/06/21/blockchain/ 279 comments
- Adobe confirms stolen passwords were encrypted, not hashed | CSO Online http://www.csoonline.com/article/742570/adobe-confirms-stolen-passwords-were-encrypted-not-hashed 199 comments
- Apple’s AirDrop and password sharing features can leak iPhone numbers | Ars Technica https://arstechnica.com/information-technology/2019/08/apples-airdrop-and-password-sharing-features-can-leak-iphone-numbers/ 188 comments
- Behold Arscoin, our own custom cryptocurrency! | Ars Technica http://arstechnica.com/business/2014/03/behold-arscoin-our-own-custom-cryptocurrency/ 137 comments
- Blockchain Proof-of-Work is a Decentralized Clock - Gregory Trubetskoy https://grisha.org/blog/2018/01/23/explaining-proof-of-work/ 128 comments
- Email explained from first principles https://explained-from-first-principles.com/email/ 109 comments
- New password security features come to Firefox with Lockwise https://blog.mozilla.org/firefox/password-security-features/ 92 comments
- Bitcoin Is Worse Is Better · Gwern.net https://www.gwern.net/Bitcoin-is-Worse-is-Better 90 comments
- Who Wrote The ‘Death Note’ Script? · Gwern.net http://www.gwern.net/Death%20Note%20script 79 comments
- Someone steals the Bored Ape belonging to former football star Dez Bryant https://web3isgoinggreat.com/?id=someone-steals-the-bored-ape-belonging-to-former-football-star-dez-bryant 78 comments
- Why Proof of Stake is Flawed with Lane Rettig — What Bitcoin Did https://www.whatbitcoindid.com/podcast/why-proof-of-stake-is-flawed 62 comments
- Introducing Amazon SNS FIFO – First-In-First-Out Pub/Sub Messaging | AWS News Blog https://aws.amazon.com/blogs/aws/introducing-amazon-sns-fifo-first-in-first-out-pub-sub-messaging/ 51 comments
- At death’s door for years, widely used SHA1 function is now dead | Ars Technica https://arstechnica.com/security/2017/02/at-deaths-door-for-years-widely-used-sha1-function-is-now-dead/ 49 comments
- Password Security The Right Way http://www.stormpath.com/blog/password-security-right-way 47 comments
- GitHub - oconnor663/sha256_project: developed for NYU Tandon's Applied Cryptography course https://github.com/oconnor663/sha256_project 45 comments
- How Long Would It Take to Mine Bitcoin by Hand? https://singularityhub.com/2014/09/30/how-long-would-it-take-to-mine-bitcoin-by-hand/ 39 comments
- Bitcoin Is Worse Is Better · Gwern.net http://www.gwern.net/Bitcoin%20is%20Worse%20is%20Better 34 comments
- GitHub - Password4j/password4j: Java cryptographic library that supports Argon2, bcrypt, scrypt and PBKDF2 aimed to protect passwords in databases. Easy to use by design, highly customizable, secure and portable. All the implementations follow the standards and have been reviewed to perform better in the JVM. https://github.com/password4j/password4j 34 comments
Related searches:
Search whole site: site:en.wikipedia.org
Search title: SHA-2 - Wikipedia
See how to search.