These are the sources and citations used to research 3-1 Discussion - Deriving the Input Number. This bibliography was generated on Cite This For Me on
In-text: (Constantin, 2022)
Your Bibliography: Constantin, L., 2022. Hashing makes it harder for attackers to decrypt stored passwords, if used correctly.. [online] Hashing explained: Why it's your best bet to protect stored passwords. Available at: <https://www.csoonline.com/article/3602698/hashing-explained-why-its-your-best-bet-to-protect-stored-passwords.html> [Accessed 13 January 2021].
In-text: (Constantin, 2022)
Your Bibliography: Constantin, L., 2022. What is hashing: How this cryptographic process protects passwords. [online] CSO Online. Available at: <https://www.csoonline.com/article/3602698/hashing-explained-why-its-your-best-bet-to-protect-stored-passwords.html> [Accessed 19 January 2022].
In-text: (Use random hashing if you care about security?, 2022)
Your Bibliography: Daniel Lemire's blog. 2022. Use random hashing if you care about security?. [online] Available at: <https://lemire.me/blog/2012/01/17/use-random-hashing-if-you-care-about-security/> [Accessed 20 January 2022].
In-text: (Cryptography in trusted computing: an introduction to secure hashing, 2022)
Your Bibliography: Militaryaerospace.com. 2022. Cryptography in trusted computing: an introduction to secure hashing. [online] Available at: <https://www.militaryaerospace.com/computers/article/16722106/cryptography-in-trusted-computing-an-introduction-to-secure-hashing> [Accessed 20 January 2022].
10,587 students joined last month!