Security Analysis. A A A A A A Theorem III.1. Under the assumption that the hash function satisfies the second preimage security, the probability of successfully performing the dependency attack is negligible.
Appears in 2 contracts
Sources: Latency First Smart Contract, Latency First Smart Contract