-
When structuring the list of cryptographic algorithms we might want to add an entry in the template to differentiate:
* Cyphers
* Hashing algorithms
We might also consider salting.
Then, among…
-
Those algorithms are useful when developing multiplatform applications with ktor.
-
One important note, I realize when I tried to use an online Blade3-256 hashing function that there are actually multiple options when hashing and I couldn't actually get the exact same digest, some ch…
-
https://crypto.stackexchange.com/questions/18612/how-is-sha1-different-from-md5
-
What algorithms are supported?
-
https://mailarchive.ietf.org/arch/msg/spasm/vzomXUHvJOouzIcC82WkMF4DP-g/
> Should the domain separator include an initial byte that identifies the type of domain separator, again similar to NIST’s …
-
An alternative hashing algorithm may help with performance. See e.g. AHash, fxhash.
-
Add hashing algorithms in any language of your choice
-
Hashing algorithms currently implemented:
- identity
- random
- crc16
Hashing algorithms currently unimplemented:
- crc16_custom
- crc32
- crc32_custom
- xor16
- csum16
stp59 updated
4 years ago
-
```
Building into ../../build
MSBuild version 17.3.4+a400405ba for .NET
Determining projects to restore...
Restored /home/miningcore/miningcore-xiaolin1579/src/Miningcore/Miningcore.csproj (i…