Collision attack

Results: 186



#Item
1Fast Collision Attack on MD5 Marc Stevens Department of Mathematics and Computer Science, Eindhoven University of Technology P.O. Box 513, 5600 MB Eindhoven, The Netherlands.

Fast Collision Attack on MD5 Marc Stevens Department of Mathematics and Computer Science, Eindhoven University of Technology P.O. Box 513, 5600 MB Eindhoven, The Netherlands.

Add to Reading List

Source URL: marc-stevens.nl

Language: English - Date: 2017-08-13 07:48:58
2SHAttered The first concrete collision attack against SHA-1 https://shattered.io A collision is when two different documents have the same hash fingerprint

SHAttered The first concrete collision attack against SHA-1 https://shattered.io A collision is when two different documents have the same hash fingerprint

Add to Reading List

Source URL: shattered.io

- Date: 2017-02-21 16:44:42
    3SHAttered The first concrete collision attack against SHA-1 https://shattered.io A collision is when two different documents have the same hash fingerprint

    SHAttered The first concrete collision attack against SHA-1 https://shattered.io A collision is when two different documents have the same hash fingerprint

    Add to Reading List

    Source URL: shattered.it

    - Date: 2017-02-21 16:44:42
      4SHAttered The first concrete collision attack against SHA-1 https://shattered.io A collision is when two different documents have the same hash fingerprint

      SHAttered The first concrete collision attack against SHA-1 https://shattered.io A collision is when two different documents have the same hash fingerprint

      Add to Reading List

      Source URL: shattered.io

      - Date: 2017-02-21 16:44:42
        5Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands  January 29, 2012

        Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands January 29, 2012

        Add to Reading List

        Source URL: marc-stevens.nl

        - Date: 2017-08-13 07:48:58
          6Attacks Against Permute-Transform-Xor Compression Functions and Spectral Hash Ethan Heilman August 26, 2009 Abstract This paper presents an attack on the strong collision resistance of the Spectral Hash SHA-3 candidate.

          Attacks Against Permute-Transform-Xor Compression Functions and Spectral Hash Ethan Heilman August 26, 2009 Abstract This paper presents an attack on the strong collision resistance of the Spectral Hash SHA-3 candidate.

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2009-08-26 12:02:39
            7MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era Qi Alfred Chen, Eric Osterweil† , Matthew Thomas†, Z. Morley Mao University of Michigan, † Verisign Labs alfchen@umich.

            MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era Qi Alfred Chen, Eric Osterweil† , Matthew Thomas†, Z. Morley Mao University of Michigan, † Verisign Labs alfchen@umich.

            Add to Reading List

            Source URL: www.verisign.com

            Language: English - Date: 2016-05-23 09:25:07
            8Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

            Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

            Add to Reading List

            Source URL: mitls.org

            Language: English - Date: 2016-01-06 07:34:05
            9Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

            Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

            Add to Reading List

            Source URL: www.mitls.org

            Language: English - Date: 2016-01-06 07:34:05