Tuesday, July 30, 2013

Lifetimes of cryptographic hash functions (valerieaurora.org)

I've written some cautionary articles on using cryptographic hashes to create content-based addresses (compare-by-hash). This page brings together everything I've written and keeps an updated table of the status of popular cryptographic hash functions.

Read more...