Hacker Trends

A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithm

https://eprint.iacr.org/2023/331

https://twitter.com/home/status/1633084668428820481

https://twitter.com/home/status/1633085868968747011

https://twitter.com/home/status/1633103290513735681

https://twitter.com/home/status/1633130063427149830

https://twitter.com/home/status/1633142768947310593

https://twitter.com/home/status/1633143266182074368


Powered by @motikan2010 . Issue nomi-sec/Hacker-Trends