Skip to content
Embedded Artistry

Embedded Artistry

Building Superior Embedded Systems

  • Welcome
  • Blog
  • Courses
  • Field Atlas
  • Memberships
  • Resources
    • Archive
    • Newsletter
    • What We’re Reading
    • For Beginners
    • Glossary
    • Libraries
    • Templates
    • YouTube Channel
  • Store
  • Consulting

Secure Hash Algorithms [SHA]

A family of cryptographic hash functions that are commonly used in computer systems.

To access this content, you must purchase a Membership - check out the different options here. If you're a member, log in.
Tags: Algorithm, Processor Peripheral, Security


« Back to Glossary Index
TagsAlgorithm, Processor Peripheral, Security

Post navigation

Previous PostPrevious Special Function Register [SFR]
Next PostNext Sharing and Reusing Architectural Knowledge [SHARK]

To discriminate between things that matter and things that don’t, a leader must detach, take a step back, and assess whether or not any detail in a situation matters. When a leader is directly involved in any problem and they immerse themselves in the minutiae of a situation, every problem seems important, every molehill looks like a mountain.Jocko Willink
Leadership Strategy and Tactics

Free Newsletter

Sign up and receive our free playbook for writing portable embedded software.

  • Login
  • RSS Feed
  • Embedded Systems Newsletter
  • Membership Information

Featured Courses

  • Fundamentals of Abstraction
    15 Lessons
  • Designing Embedded Software for Change
    67 Lessons
  • Heapless C++
    27 Lessons
  • My Account
  • Privacy Policy
  • Contact Us
  • GitHub
  • LinkedIn
  • Twitter

©2026 Embedded Artistry LLC. All rights reserved.
EMBEDDED ARTISTRY and the OWL logo are registered trademarks of Embedded Artistry LLC.

Privacy Policy Proudly powered by WordPress