Follow

@lupyuen

Apparently, symmetric-key algorithms and hash functions are safe (with a large enough key) but public-key algorithms are vulnerable.

en.wikipedia.org/wiki/Post-qua

Sign in to participate in the conversation
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.