サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
iPhone 16
valerieaurora.org
I've written some cautionary articles on using cryptographic hashes to create content-based addresses (compare-by-hash). This page brings together everything I've written and keeps an updated table of the status of popular cryptographic hash functions. Quick summary of my recommendations on compare-by-hash: If you are using compare-by-hash to generate addresses for data that can be supplied by mal
I am no longer maintaining the TCP/IP Drinking Game. If you have awesome questions you want to add to it, please start maintaining a new version. If you do so, email me and I'll add a link to your version from this page. Ithilgore has started a new iteration of the TCP/IP Drinking Game. You can play the TCP/IP drinking game just about any way you want, as long as you remember that the point is to
このページを最初にブックマークしてみませんか?
『Valerie Aurora』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く