DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Technology Malicious Hashing: Eve’s Variant of SHA-1

1. Malicious Hashing: Eve’s Variant of SHA-1 Ange Albertini1 , Jean-Philippe Aumasson2 , Maria Eichlseder3 , Florian Mendel3 , and Martin Schl¨affer3 1 Corkami, Germany…

Technology SHA-1 backdooring & exploitation

1. SHA-1 backdooring and exploitation 2. brought to you by Maria Eichlseder, Florian Mendel, Martin Schläffer TU Graz, .at; cryptanalysis @angealbertini Corkami, .de; binary…