Hash type matters Attackers might not use the same kind of hardware and software as ours They might use a more suitable, attack-optimized setup They might have a preference to use whatever they readily have (e.g., existing GPU rigs, botnets) A good hash type to use is: friendly to our hardware unfriendly to hardware that we do not anticipate to use efficiently implemented for defense does not allow for much additional optimization for attack