> Avoid: custom “keyed hash” constructions, HMAC-MD5, HMAC-SHA1, complex polynomial MACs, encrypted hashes, CRC.
https://latacora.micro.blog/2018/04/03/cryptographic-right-a...
> Avoid: custom “keyed hash” constructions, HMAC-MD5, HMAC-SHA1, complex polynomial MACs, encrypted hashes, CRC.
https://latacora.micro.blog/2018/04/03/cryptographic-right-a...