News

America's Next Top Hash Function Begins The biggest cryptography competition in years has kicked off, with nothing less than the security of the internet at stake.
Security researchers announced the first practical collision attack against the Secure Hash Algorithm-1 cryptographic function.
Its cryptographic hash function works around the Advanced Encryption Standard (AES), a military-level algorithm for extreme security, making CryptoNight a mining algorithm highly focused on security.
IOTA created its own cryptographic hash function, something cryptographers claim is not a good idea.
The essential metric for bitcoin network security reached more than 65 trillion hashes per second on Wednesday this week.
Bloom Filters and Hash Functions in Data Structures Publication Trend The graph below shows the total number of publications each year in Bloom Filters and Hash Functions in Data Structures.