Return to Article Details Redefining hash functions for quantum security with SHA 256 Download Download PDF