Report copyright - SAT-based preimage attacks on SHA-1 · application scenarios is the Secure Hash Algorithm (SHA-1). In this thesis we investigate the current state of the art in carrying out preimage
Please pass captcha verification before submit form