An attack that involves finding inputs that create the same hash, to find flaws within hashing algorithms.
Can be used to embed malicious documents with percieved secure hashes.
An attack that involves finding inputs that create the same hash, to find flaws within hashing algorithms.
Can be used to embed malicious documents with percieved secure hashes.