News

Hash functions are the most commonly used cryptographic ... Personally, I was part of a group of eight cryptographers that submitted Skein to the competition. A decade ago, writing Twofish and ...
“We are going to replace our use of the SHA-2 hash functions with the Skein hash function. We are also examining using the Threefish cipher where that makes sense.” The company also plans to ...