Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

All three are extremely good for this use case, when the competition is SHA-1. Beyond that, I don't know enough to compare the three. So yeah, it came out of my butt.

If Colin has a paper on it then I trust his comparison. What I really meant to say is what you said: all three are just fine.

Also, I thought I remembered my comment's parent saying something stronger, either it was edited later, or I was drunk when I decided it was worth commenting on.



I just wanted to write the word "butt". Thanks for being cool about it. :)


hahahaha, well, what you wrote was worthwhile and (as far as I can tell) correct. Thanks.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: