Linked Presentation: Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknessesReversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol