This paper describes a vulnerability in implementations of SHA-3, SHAKE, EdDSA, and other NIST-approved algorithms #vuln #software #crypto #poc #threats #informatique
https://eprint.iacr.org/2023/331.pdf
Comme le soleil, les machines ne se couchent jamais.