Re: Subresource Integrity Length Extension?

On 28.01.2014 09:43, Frederik Braun wrote:
> On 27.01.2014 17:50, Andrew wrote:
>> http://en.wikipedia.org/wiki/Length_extension_attack
>>

Quoting from the wiki page, I find it notable that the "SHA-3 algorithm
is not susceptible to this attack."

Received on Tuesday, 28 January 2014 09:02:37 UTC