F
frank.meulblok
Guest
That is true, but you still want to minimize the exposure the hashes get as well. After all, if you can get the hash values, you can use them as targets for a collision attack or preimage attack.
Continue reading...
Continue reading...