Hacker News new | past | comments | ask | show | jobs | submit login

As far as I’m aware, hash algos like SHA or Scrypt are not the type of math that quantum computing threatens.



But elliptic signature algorithm are, and that's what lets you steal coins.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: