How Many Kangaroos? Twelve!

The problem with competitions, is that the winner will often take all, until the next competition. Those competing could thus get better than the winner, but it is often too late. So let’s look at the SHA-3 competition, and how things have evolved.

NIST created a competition for SHA-3, and it was Keccak that was crowned the champion. Since then, SHA-3 has received good adoption levels, but you’ll also see BLAKE2 —…




This publication brings together interesting articles related to cyber security.

Recommended from Medium

How a HIPAA Security Assessment Can Keep You Compliant


Tips on Engaging Readers in Cybersecurity and Computer Science: My Top 10

{UPDATE} Kelimece - Süper Kelime Oyunu Hack Free Resources Generator

Let me give you a tip of the iceberg about the Bondex token👍

How Do I Reveal How I Voted, But Still Keep My Vote Secret?

Summary of update adjustments this week

What's this new privacy law all about?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium

Can I Reveal Part of My Answer To You, Without Revealing The Rest of It?

Build an URL Shortener with LFU Cache by Rust

Can I Prove To You I Have Added Data … Without Revealing Any Other Data?