top | item 10011616 (no title) logicrime | 10 years ago I gotcha, that makes sense to do it that way, such that if the foundation of SHA-2 is compromised, SHA-3 can be deployed safely where it's needed. discuss order hn newest No comments yet.
No comments yet.