Lifetimes of Cryptographic Hash Functions