SHA1 backdooring and exploitation

SHA1 backdooring and exploitation

Presented by