Questioning the Criteria for Evaluating Non-Cryptographic Hash Functions
There seems to be a gap in how cryptographic and non-cryptographic hash functions are designed.
Questioning the Criteria for Evaluating Non-Cryptographic Hash Functions
There seems to be a gap in how cryptographic and non-cryptographic hash functions are designed.
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved