Linked Presentation: A comprehensive, formal and automated analysis of the EDHOC protocolHash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses