A Study of the MD5 Attacks: Insights and Improvements
- 1 January 2006
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 262-277
- https://doi.org/10.1007/11799313_17
Abstract
No abstract availableKeywords
This publication has 7 references indexed in Scilit:
- How to Break MD5 and Other Hash FunctionsLecture Notes in Computer Science, 2005
- Cryptanalysis of the Hash Functions MD4 and RIPEMDLecture Notes in Computer Science, 2005
- Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision ResistanceLecture Notes in Computer Science, 2004
- A Design Principle for Hash FunctionsPublished by Springer Science and Business Media LLC ,2001
- Collisions for the compression function of MD5Lecture Notes in Computer Science, 1994
- The MD5 Message-Digest AlgorithmPublished by RFC Editor ,1992
- One Way Hash Functions and DESPublished by Springer Science and Business Media LLC ,1990