Hacker News new | past | comments | ask | show | jobs | submit login

Source? The purpose of the verifier is to be difficult to reverse or collide.



Source: it's obvious? John The Ripper implements the attack? You can trivially implement the attack yourself? This is literally a Cryptopals exercise?


Wonderful source. Thanks.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: