MD5

Results: 480



#Item
1Cryptography / Public-key cryptography / Cryptographic hash functions / Key management / Cryptographic protocols / Public key infrastructure / MD5 / X.509 / Public key fingerprint / Collision resistance / MerkleDamgrd construction / SHA-2

MD5 considered harmful today Creating a rogue CA certificate December 30, 2008 Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2018-01-29 20:02:27
2

1 MD5 To Be Considered Harmful Someday Dan Kaminsky Senior Security Consultant, Avaya

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-06 19:52:41
    3

    Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities version 1.1, 4th November 2006 Marc Stevens1 , Arjen Lenstra2 , and Benne de Weger1 1

    Add to Reading List

    Source URL: www.win.tue.nl

    Language: English - Date: 2006-11-04 16:01:04
      4

      How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, , Abstract. MD5 is one of the most widely used cryptographic hash funct

      Add to Reading List

      Source URL: merlot.usc.edu

      Language: English - Date: 2005-11-09 16:49:02
        5

        MD5 Chosen­Prefix Collisions on GPUs Marc Bevand Black Hat USA 2009 ­ July 30, 2009

        Add to Reading List

        Source URL: www.zorinaq.com

        Language: English - Date: 2010-05-02 19:12:52
          6Cryptography / Cryptographic hash functions / MD5 / Q17 / MD4 / Q10 / Collision attack / Crypt

          Fast Collision Attack on MD5 Marc Stevens Department of Mathematics and Computer Science, Eindhoven University of Technology P.O. Box 513, 5600 MB Eindhoven, The Netherlands.

          Add to Reading List

          Source URL: marc-stevens.nl

          Language: English - Date: 2017-08-13 07:48:58
          7Cryptography / Cryptographic hash functions / Cryptographic protocols / MD5 / Hashing / Search algorithms / Public-key cryptography / Collision attack / Marc Stevens / Hash function / X.509 / Transport Layer Security

          Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate Marc Stevens1 , Alexander Sotirov2 , Jacob Appelbaum3 , Arjen Lenstra4,5 , David Molnar6 , Dag Arne Osvik4 and Benne de Weger7 1

          Add to Reading List

          Source URL: marc-stevens.nl

          Language: English - Date: 2017-08-13 07:48:58
          8

          322 Int. J. Applied Cryptography, Vol. 2, No. 4, 2012 Chosen-prefix collisions for MD5 and applications Marc Stevens*

          Add to Reading List

          Source URL: documents.epfl.ch

          Language: English - Date: 2012-08-03 05:02:16
            9

            Chosen-prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities Marc Stevens1 , Arjen Lenstra2 , and Benne de Weger1 1 TU Eindhoven, Faculty of Mathematics and Computer Science

            Add to Reading List

            Source URL: marc-stevens.nl

            - Date: 2017-08-13 07:48:58
              10

              Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands January 29, 2012

              Add to Reading List

              Source URL: marc-stevens.nl

              - Date: 2017-08-13 07:48:58
                UPDATE