Skip to content

Instantly share code, notes, and snippets.

Avatar

Jean-Philippe Aumasson veorq

View GitHub Profile
@veorq
veorq / paperwriting.md
Last active Nov 9, 2020
Recommended reading for writers of research papers
View jpa.asc
-----BEGIN PGP PUBLIC KEY BLOCK-----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 gist:6de12951c4faaaa5d32d
### Keybase proof
I hereby claim:
* I am veorq on github.
* I am veorq (https://keybase.io/veorq) on keybase.
* I have a public key whose fingerprint is 552D 1262 0D6D D218 31C9 F8C0 BB9E 780D 4EC8 0BA4
To claim this, I am signing this object:
@veorq
veorq / simple.py
Last active Dec 20, 2015
Simple password hash
View simple.py
"""
This is an EXPERIMENTAL password hash with time and memory parameters,
such that the time parameter does not affect the memory required (but
does affect the number of memory accesses).
This was quickly designed, with no real test, so it's probably a silly
design and the code may be broken. Therefore, please:
- Do not use it to hash real passwords!
- Attack it! (circumvent the time/memory requirements, find biases...)