WRITEUP #1444
A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithms
OtherCryptographic issuesBuffer Overflow
byNicky Mouha
Program
PythonPHPPyPySHA3 for RubyKeccak Team
Published
Mar 6, 2023
Added to HackDex
Mar 8, 2023
Read Full Writeuphttps://eprint.iacr.org/2023/331.pdf