top | item 22842440 (no title) bascule | 5 years ago If you use an unkeyed hash (as opposed to a PRF) on low-entropy inputs, they can be preimaged by an attacker.This is especially problematic in the case of PII like email address/phone number discuss order hn newest No comments yet.
No comments yet.