Talk:Comparison of cryptographic hash functions: Difference between revisions

Content deleted Content added
Quelrod (talk | contribs)
No edit summary
that table!
Line 9:
It would be very interesting if someone would take the time to gather license/patent information about the algorithms :)
-LM
 
Putting attack on the complete algorithm and attack on reduced rounds versions in the same table is completely unreadable, mixing practical weaknesses and irrelevant to practical security ones...