1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

SLOTH attacks weaken secure protocols because they still use MD5 and SHA-1

Discussion in 'Help Net Security' started by RSS, Jan 8, 2016.

  1. RSS

    RSS New Member Member

    Researchers Karthikeyan Bhargavan and Gaëtan Leurent from INRIA, the French national research institute for computer science, have discovered a new class of transcript collision attacks that can...

    Continue reading...

Share This Page