All cryptography uses hash functions. if it exists [a way to break hashing] we are doomed as human beings. That’s over for cryptography.The NIST-approved post-quantum signatures are at least ten times ...