[I]nstead of focusing on one or two concepts, I'll try to go through as many Rust snippets as I can, and explain what the keywords and symbols they contain mean.
SHA-2 (Secure Hash Algorithm 2), of which SHA-256 is a part, is one of the most popular hashing algorithms out there. In this article, we are going to break down each step of the algorithm as simple as we can and work through a real-life example by hand.
S. Krumm, and A. Dwertmann. Künstliche Intelligenz: Technologien -- Anwendung -- Gesellschaft, chapter 8, Springer Vieweg, Berlin and Heidelberg, (2018)
W. Bauer, B. Dworschak, and H. Zaiser. Handbuch Industrie 4.0 Bd.\, 1: Produktion, Springer, Berlin, 2 edition, DOI: 10.1007/978-3-662-45279-0\_36.(2017)
J. Beyerer, O. Niggemann, and C. Kühnert (Eds.) Technologien für die intelligente Automation/Technologies for Intelligent Automation Springer Vieweg, Berlin, (2017)
O. Niggemann, and J. Beyerer (Eds.) Technologien für die intelligente Automation/Technologies for Intelligent Automation Springer Vieweg, Berlin, (2016)
M. Barz, M. Moniri, M. Weber, and D. Sonntag. Adjunct Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '16), Heidelberg, Germany, page 17--20. New York, ACM, (2016)
G. Schuh, R. Senderek, and G. Gudergan. Management industrieller Dienstleistungen: Handbuch Produktion und Management 8, chapter 10, Springer Vieweg, Berlin, 2 edition, (2016)