Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
gitrebase
on July 26, 2019
|
parent
|
context
|
favorite
| on:
Decades-Old Computer Science Conjecture Solved in ...
I doubt any study of hash functions restricts itself to studying a very tiny subset of all possible (infinite) inputs. The security of hash functions is always studied under the assumption of arbitrary inputs.
Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: