Glad to help! :)
On Mar 11, 5:21 pm, Cerebrus <[email protected]> wrote: > Good answer ! :-) > > On Mar 11, 6:01 am, Benj Nunez <[email protected]> wrote: > > > "And what I want to know how to choose an algorithm. You know > > something > > like weakeness comparison and known attacks. " > > > This link might help you: > > >http://en.wikipedia.org/wiki/Cryptographic_hash_function > > > There is an outline of a list of hash functions (complete with links) > > at the bottom > > of the page. For known weaknesses, these are mentioned under the > > "Security" heading. > > > Cheers! > > > Benj
