Panagiotis Vasilikossecuringbits.com·Apr 10, 2024Hash Collision AttacksThe SHA-2 family of hash functions lies at the core of securing the internet today. A recent paper by Yingxin Li, Fukang Liu, and Gaoli Wang presents new records in collision attacks for SHA-2. For the brave, the paper can be found at: https://eprint...CryptographyAdd a thoughtful commentNo comments yetBe the first to start the conversation.