Understanding Hash Cryptography In Blockchains Part 2: Five Requirements of a Cryptographic Hash Function
In Part One , we saw what a cryptographic hash function is and in this short five minute introduction to Blockchain, we saw how it used in a Blockchain. Today, I will try to explain the five requirements of a good cryptographic hash function.
A go...
a6z.co4 min read