Security of the SHA Family of Hash Functions
Current Berkman People and Projects 2014-09-15
Summary:
Good article on the insecurity of SHA-1 and the need to replace it sooner rather than later....
Link:
https://www.schneier.com/blog/archives/2014/09/security_of_the.htmlUpdated:
09/15/2014, 11:29From feeds:
Fair Use Tracker » Current Berkman People and ProjectsGudgeon and gist » Schneier on Security