top | item 20535356 (no title) gitrebase | 6 years ago I doubt any study of hash functions restricts itself to studying a very tiny subset of all possible (infinite) inputs. The security of hash functions is always studied under the assumption of arbitrary inputs. discuss order hn newest No comments yet.
No comments yet.