adambowie.com
A pair of fascinating articles (article 1, article 2) about hash functions and recent cryptographic breakthroughs and the possibility of many cryptographic strategies being made redundant. Great reading.
Posted
in
Tags: