Comment by cryptonector
3 months ago
One does not place backdoors in hash algorithms. It's much more interesting to place backdoors in key agreement protocols.
3 months ago
One does not place backdoors in hash algorithms. It's much more interesting to place backdoors in key agreement protocols.
How would NSA have "placed" a backdoor in Kyber? NSA didn't write Kyber.