One network tries to clean-room implement the hash function. The other network tries to find an input for which the reference implementation behaves differently.
One network tries to clean-room implement the hash function. The other network tries to find an input for which the reference implementation behaves differently.