Common use of Security Analysis Clause in Contracts

Security Analysis. A A A A A A Theorem III.1. Under the assumption that the hash function satisfies the second preimage security, the probability of successfully performing the dependency attack is negligible.

Appears in 2 contracts

Sources: Latency First Smart Contract, Latency First Smart Contract