Skip to main content
The 2024 Developer Survey results are live! See the results
Search type Search syntax
Tags [tag]
Exact "words here"
Author user:1234
user:me (yours)
Score score:3 (3+)
score:0 (none)
Answers answers:3 (3+)
answers:0 (none)
isaccepted:yes
hasaccepted:no
inquestion:1234
Views views:250
Code code:"if (foo != bar)"
Sections title:apples
body:"apples oranges"
URL url:"*.example.com"
Saves in:saves
Status closed:yes
duplicate:no
migrated:no
wiki:no
Types is:question
is:answer
Exclude -[tag]
-apples
For more details on advanced search visit our help page
Results tagged with
Search options not deleted user 189423

The process of decoding data that has been encrypted into a secret format.

2 votes
Accepted

I need to compute a string whose SHA256 hash matches a given prefix. How should I approach it?

If I have understood your problem correctly (from the clarification in your comment), in short, brute force will be your only option. But if you know a few boundaries to the problem and you don't mind …
Johnny's user avatar
  • 1,061
3 votes

Losing the Initialization Vector in Cipher Block Chaining

In a cipher block chain, each block is XORed with the ciphertext of the previous block, not the plaintext. So even if you cannot decipher one block, as long as you have received the complete block int …
Johnny's user avatar
  • 1,061