Timeline for Underhanded Password Hashing
Current License: CC BY-SA 3.0
7 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Jun 17, 2020 at 9:04 | history | edited | CommunityBot | Commonmark migration | |
| Apr 5, 2012 at 3:27 | comment | added | user unknown | @KeithRandall: I could 'accidentally' only use positive Bytes, which would reduce the possibilities to math.pow (27, 16), but that is still about 8e22. | |
| Apr 5, 2012 at 3:23 | comment | added | user unknown | @ajax333221: Scala. I added it to the top. | |
| Apr 5, 2012 at 3:05 | history | edited | user unknown | CC BY-SA 3.0 | added scala tag |
| Apr 5, 2012 at 1:57 | comment | added | ajax333221 | you forgot the name of the language | |
| Apr 4, 2012 at 19:40 | comment | added | Keith Randall | 5.22e27 >> 2^16. There's no way to brute force that many possibilities. | |
| Apr 3, 2012 at 15:06 | history | answered | user unknown | CC BY-SA 3.0 |