A complete C implementation of the Kelsey-Schneier second preimage attack on Merkle-Damgård hash functions using Speck48/96 cipher and Davies-Meyer compression
-
Updated
Dec 23, 2025 - C
A complete C implementation of the Kelsey-Schneier second preimage attack on Merkle-Damgård hash functions using Speck48/96 cipher and Davies-Meyer compression
Browser-based Merkle tree and inclusion proof demo — build trees up to 16 leaves with real SHA-256, generate O(log n) membership proofs, tamper any leaf and watch the root change, with Git, Bitcoin, and Certificate Transparency walkthroughs. Part of crypto-lab.
Add a description, image, and links to the second-preimage-attack topic page so that developers can more easily learn about it.
To associate your repository with the second-preimage-attack topic, visit your repo's landing page and select "manage topics."