Understanding the Security of Cryptographic Hash Functions(jeffcarp.com)2 points by magicarp 8 years ago | 0 commentsNo comments yet