- Confused about SHA-512 round constants https://en.wikipedia.org/wiki/SHA-2#Pseudocode 4 comments learnprogramming
- [C] Implenting SHA256, where do I start? http://en.wikipedia.org/wiki/SHA-2#Pseudocode 5 comments learnprogramming
Linking pages
- Ethereum’s “Merge” is about to put every ether miner out of work | Ars Technica https://arstechnica.com/tech-policy/2022/08/the-merge-the-biggest-change-in-ethereum-history-explained/ 2407 comments
- Why Google is Hurrying the Web to Kill SHA-1 https://konklone.com/post/why-google-is-hurrying-the-web-to-kill-sha-1 391 comments
- A from-scratch tour of Bitcoin in Python https://karpathy.github.io/2021/06/21/blockchain/ 279 comments
- Design Of This Website · Gwern.net https://www.gwern.net/Design 254 comments
- Adobe confirms stolen passwords were encrypted, not hashed | CSO Online http://www.csoonline.com/article/742570/adobe-confirms-stolen-passwords-were-encrypted-not-hashed 199 comments
- Apple’s AirDrop and password sharing features can leak iPhone numbers | Ars Technica https://arstechnica.com/information-technology/2019/08/apples-airdrop-and-password-sharing-features-can-leak-iphone-numbers/ 188 comments
- Behold Arscoin, our own custom cryptocurrency! | Ars Technica http://arstechnica.com/business/2014/03/behold-arscoin-our-own-custom-cryptocurrency/ 137 comments
- Blockchain Proof-of-Work is a Decentralized Clock - Gregory Trubetskoy https://grisha.org/blog/2018/01/23/explaining-proof-of-work/ 128 comments
- Email explained from first principles https://explained-from-first-principles.com/email/ 109 comments
- How Large is a 160 Bit Number? | DoltHub Blog https://www.dolthub.com/blog/2024-05-28-160-bits/ 108 comments
- New password security features come to Firefox with Lockwise https://blog.mozilla.org/firefox/password-security-features/ 92 comments
- Developing a cryptographically secure bootloader for RISC-V in Rust https://www.codethink.co.uk/articles/2024/secure_bootloader/ 91 comments
- Bitcoin Is Worse Is Better · Gwern.net https://www.gwern.net/Bitcoin-is-Worse-is-Better 90 comments
- Who Wrote The ‘Death Note’ Script? · Gwern.net http://www.gwern.net/Death%20Note%20script 79 comments
- Someone steals the Bored Ape belonging to former football star Dez Bryant https://web3isgoinggreat.com/?id=someone-steals-the-bored-ape-belonging-to-former-football-star-dez-bryant 78 comments
- Why Proof of Stake is Flawed with Lane Rettig — What Bitcoin Did https://www.whatbitcoindid.com/podcast/why-proof-of-stake-is-flawed 62 comments
- Introducing Amazon SNS FIFO – First-In-First-Out Pub/Sub Messaging | AWS News Blog https://aws.amazon.com/blogs/aws/introducing-amazon-sns-fifo-first-in-first-out-pub-sub-messaging/ 51 comments
- At death’s door for years, widely used SHA1 function is now dead | Ars Technica https://arstechnica.com/security/2017/02/at-deaths-door-for-years-widely-used-sha1-function-is-now-dead/ 49 comments
- Password Security The Right Way http://www.stormpath.com/blog/password-security-right-way 47 comments
- GitHub - oconnor663/sha256_project: developed for NYU Tandon's Applied Cryptography course https://github.com/oconnor663/sha256_project 45 comments
Related searches:
Search whole site: site:en.wikipedia.org
Search title: SHA-2 - Wikipedia
See how to search.