SHA-2 (Secure Hash Algorithm 2), of which SHA-256 is a part, is one of the most popular hashing algorithms out there. In this article, we are going to break down each step of the algorithm as simple as we can and work through a real-life example by hand.
[I]nstead of focusing on one or two concepts, I'll try to go through as many Rust snippets as I can, and explain what the keywords and symbols they contain mean.
V. Bryl, C. Giuliano, L. Serafini, and K. Tymoshenko. The Semantic Web -- ISWC 2010: 9th International Semantic Web Conference, Shanghai, China, Revised Selected Papers, Part I, volume 6496 of Lecture Notes in Computer Science, Springer, Berlin, (2010)
L. Chen, J. Hoey, C. Nugent, D. Cook, and Z. Yu. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 42 (6):
790-808(November 2012)
A. Cohn, D. Hogg, R. Möller, and B. Neumann (Eds.) volume 08091 of Dagstuhl Seminar Proceedings, Dagstuhl, Germany, Schloss Dagstuhl--Leibniz-Zentrum für Informatik, (2008)