DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Technology Malicious Hashing: Eve’s Variant of SHA-1

1. Malicious Hashing: Eve’s Variant of SHA-1 Ange Albertini1 , Jean-Philippe Aumasson2 , Maria Eichlseder3 , Florian Mendel3 , and Martin Schl¨affer3 1 Corkami, Germany…

Technology $kernel->infect(): Creating a cryptovirus for Symfony2 apps

1.MALICIOUS CRYPTOGRAPHY IN SYMFONY APPS Raul Fraile @raulfraile 2. • PHP/Symfony2 developer at • PHP 5.3 Zend Certified Engineer • Symfony Certified Developer •…