DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Technology SHA-1 backdooring & exploitation

1. SHA-1 backdooring and exploitation 2. brought to you by Maria Eichlseder, Florian Mendel, Martin Schläffer TU Graz, .at; cryptanalysis @angealbertini Corkami, .de; binary…