Completion requirements
View
While the material in this video is quite advanced, it is important that you understand that quantum attacks on hash functions are also being studied. Use this video to stretch your understanding of how quantum attacks might be used in this application.
Source: IACR, https://www.youtube.com/watch?v=JcLv8IdkEno This work is licensed under a Creative Commons Attribution 3.0 License.