SHA1 backdooring and exploitation

Presented by