AceDXebec AceDXebec 25-11-2020 Computers and Technology contestada what are the characteristics needed in a secure hash function?