top | item 20535356

(no title)

gitrebase | 6 years ago

I doubt any study of hash functions restricts itself to studying a very tiny subset of all possible (infinite) inputs. The security of hash functions is always studied under the assumption of arbitrary inputs.

discuss

order

No comments yet.