Cryptographic Hash Functions

A pair of fascinating articles (article 1, article 2) about hash functions and recent cryptographic breakthroughs and the possibility of many cryptographic strategies being made redundant. Great reading.


Posted

in

Tags: