-
Blake (2s) Hashing Algorithm and Its Current State
If you don’t know what a hash function is or why we need them in crypto, let me break it down for ya: A…
-
Blake 2s: The Last Stand Against ASIC Mining?
This algorithm has been dubbed “the last stand against ASIC mining” due to its resistance to specialized hardware. But what exactly is Blake 2s…
-
BLAKE2 Hash Function: A Public Domain Dedication
But hold on there, bucko! Let me introduce you to the latest kid on the block: Blake2. Now, I know what you’re thinking again,…
-
Blake2s for Key Derivation in Encryption and MAC
Blake2s is a cryptographic hash function that can be used to generate secret keys from input data through the HKDF (Hashing Key Derivation Function)…
-
Secure Password Generation Techniques
But let’s face it coming up with strong and unique passwords can be a real pain in the *****! That’s why we’re here to…
-
BTCRecover Performance Improvement
Alright, something that’ll make your crypto-loving hearts sing: performance improvement! If you’re like us, you love nothing more than watching those sweet, sweet numbers…
-
Generating Address Lists using Ethereum-ETL
To set the stage: what exactly is Ethereum ETL? It stands for Extract, Transform, Load the process of extracting data from one system (in…
-
Generating Address Lists for Cryptocurrencies
Before anything else: why would anyone need an address list in the world of crypto? Well, let’s say you have a bunch of friends…