Cryptographic hash functions are defined for bit strings of arbitrary length, but does anyone implement or use them that way?
-
-
@jedisct1 That's circular. The NIST candidates were required to do that.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.