and 256 bits of security, there is a need for companion hash algorithms which provide similar levels of enhanced security. SHA-256, described in Chapter 2 ...
確定! 回上一頁