hash   8387

« earlier    

Everything You Wanted to Know About Hashing and Encrypting Passwords
An iterative hash function breaks up a message into blocks of a fixed size and iterates over them with a compression function. For example, SHA-1 operate on 512-bit blocks. The size of the output of…
hash  pbkdf2 
23 hours ago by arisco97
Advanced Ruby Hash Techniques
When you use something as much as Ruby developers use Hashes, it's easy to think you've seen it all.
ruby  hash  tips  article 
4 days ago by emak
jonathanhecl/autosign: AutoSignature Executable in Golang
GitHub is where people build software. More than 28 million people use GitHub to discover, fork, and contribute to over 85 million projects.
go  golang  hash  signature  build  executable 
5 days ago by vonc
Which hashing algorithm is best for uniqueness and speed?
Example (good) uses include hash dictionaries. I know there are things like SHA-256 and such, but these algorithms are designed to be sec...
performance  cryptography  hash  algorithm  blog-material 
7 days ago by lenciel
The option to disable global hash-checking mode? · Issue #4344 · pypa/pip
Can't mix hashed PyPI requirements with unhashed installed as editable from a git checkout.
pip  hash  install  editable  github  url 
11 days ago by christianmlong
Itty Bitty | How it works
itty bitty sites are contained entirely within their own link. (Including this one!) This means they're portable, private, and easy to share.
sharing  html  hack  hash  portable  encoding  compression 
15 days ago by vloux

« earlier    

related tags

__eq__  __hash__  access  algo  algorithm  algorithms  android  app  archive  array  article  associative_array  attrs  automata  balancing  bash  basics  bcrypt  bitcoin  blockchain  blog-material  blog  bloomfilter  breakfast  brotli  browns  brunch  build  bytell_hash_map  c#  c++  c  casserole  cdn  code  coding  complexity  compressed  compression  computer-science  computing  consistent  convert  cop3502  crack  cracking  creditcard  crypto  cryptography  cs  cs1  data  datastructures  developer  development  dht  digitalsignature  domain  dotnet  ds  editable  email  encoding  equality  ethereum  exclude  executable  fabric  fallback  fibonacci  firefly  function  functions  game  gameoflife  generator  generics  gesture  git  github  go  golang  golden-ratio  gotcha  hack  hacks  hash-tables  hashcode  hashextension  hashgraph  hashing  hashmap  hashmaps  hashtable  hashtbl  history  html  hyperledger  id  impacket  implementation  information  infosec  install  interface  intrustion  java  life  list  load-distribution  lodash  lzma  map  maps  md5  membership  memmap  memory  network  ntlm  objectarray  openssl  overlay  p2p  password  paths  pbkdf2  pentest  performance  philippeoechslin  phone  php  pip  poe  portable  postgresql  prime  programming  proof  proposal  publishing  python  rainbow  rdf  readlater  reasonml  reference  relay  resource  resources  ruby  s1-fireflies  scalable  script  sec  security  sha1  sha256  sharing  sign  signature  smb  snappy  spoof  sri  stackoverflow  standards  strings  strlen  struct  structured  tamper  tips  tolerant  toread  transform  type:article  typed  url  vanity  web  webapp  webdev  webp  wikipedia  windows  wtf  xml  算法 

Copy this bookmark: