lessons from the history of attacks on secure hash functions

by Zooko Wilcox, Zcash and LeastAuthority, 2017-02-24

This document is a work-in-progress. Please contact the author if you see errors or omissions.

Go to https://z.cash/technology/history-of-hash-function-attacks.html and hit reload until the new version of this document appears.