top | item 10011616

(no title)

logicrime | 10 years ago

I gotcha, that makes sense to do it that way, such that if the foundation of SHA-2 is compromised, SHA-3 can be deployed safely where it's needed.

discuss

order

No comments yet.