z-logo
open-access-imgOpen Access
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses
Author(s) -
Vincent Cheval,
Cas Cremers,
Alexander Dax,
Lucca Hirschi,
Charlie Jacomme,
Steve Kremer
Publication year - 2023
Publication title -
hal (le centre pour la communication scientifique directe)
Language(s) - English
Resource type - Conference proceedings
Subject(s) - computer science , hash function , exploit , protocol (science) , hash chain , sha 2 , computer security , cryptographic hash function , function (biology) , computer network , medicine , alternative medicine , pathology , evolutionary biology , biology

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here