AVR Smart Technologiesavrsmarttech.hashnode.dev·Dec 9, 2024SHA-256: The Foundation of Modern Cryptographic SecuritySHA-256 (Secure Hash Algorithm 256-bit) is a cryptographic hash function pivotal to numerous security applications in digital environments. Developed by the National Security Agency (NSA) and standardized by the U.S. National Institute of Standards a...AVR BlockchainBlockchain
Legos Lightlegos.hashnode.dev·Sep 13, 2024Hàm Hash và một số ứng dụngHàm băm (hàm hash) là một trong những thành phần cốt lõi của mật mã. Sở dĩ mình quyết định giới thiệu về hash là vì nó được sử dụng khá nhiều trong các kỹ thuật về blockchain như: wallet address, digital signature, merkle tree, bloom filter, proof-of...Cryptography & Blockchainhash function
Riyaz Nabiyullariyaz-blog.hashnode.dev·Jul 6, 2024Persisted Queries in GraphQLGraphQL is a powerful tool for API development, offering flexibility and efficiency. One advanced feature of GraphQL, known as persisted queries, can enhance both performance and security. We will also dive into how the sha256Hash is generated and it...106 readspersisted queries
Sai Keerthan Kasulakeerthankasula.hashnode.dev·Jun 30, 2024Part 4: The digital signature and non-repudiation.Previously, we discussed some cryptography operations, including encryption, decryption, and the concept of public key infrastructure. Now, let's explore the process of generating a digital signature and how it is used for non-repudiation. Have you e...data signing
Sudhanshu Wanitechblog01.hashnode.dev·Jun 18, 2024Understanding Hashing and Its Different Types in Cyber Security 🔐Introduction to Hashing Hashing is an essential component of data integrity, authentication, and security protocols, making it a critical concept in both computer science and cyber security. It involves converting any size of input data into a fixed-...Understanding Hashing
James Mathengecodejunction.hashnode.dev·Jul 18, 2023See Hash Functions in Action: A Practical Example of SHA-256 and MD5 HashingHash functions like SHA-256 and MD5 are extensively used in real-world applications. In this article, we will showcase the hashing process through hands-on examples. Read on to gain a practical understanding of cryptographic hash functions. Introduct...10 likesHashing
Rishabh Bassirishabhbassi.hashnode.dev·Jun 4, 2023Benchmarking Hashing Algorithms: A Comprehensive AnalysisWelcome to our interactive blog post on benchmarking hashing algorithms! In this post, we will explore various hashing algorithms and compare their performance using real-world scenarios. So let's dive in and see how different algorithms fare in term...26 readsHashing
Nehal IngoleforTeckbaker's Blogteckbakers.hashnode.dev·May 8, 2023CryptographyIn this last blog, we learn about what is cryptography? what is the use of cryptography? Implementation of the practice of client and server interacting with each other and also the use of another password if the hacker is present in the middle of...48 readsCryptography