Photo by Ryan on Unsplash

For Limited Capability Processors … here’s the Pearson Hash

Not every computing device is a high-powered process and needs the security of cryptography hashes. In fact, there are more processors that run with 8-bit or 16-bit registers than are with powerful 32-bit or 64-bit registers. So we sometimes need methods that process with 8-bit registers, and so in 1990, Peter K. Pearson published a classic paper [here]:

--

--

--

This publication brings together interesting articles related to cyber security.

Recommended from Medium

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium