MD5

Results: 480



#Item
51SPHINCS: practical stateless hash-based signatures 1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , 3 4 4 Ruben Niederhagen , Louiza Papachristodoulou , Peter Schwabe , and

SPHINCS: practical stateless hash-based signatures 1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , 3 4 4 Ruben Niederhagen , Louiza Papachristodoulou , Peter Schwabe , and

Add to Reading List

Source URL: cryptojedi.org

Language: English - Date: 2014-10-04 10:08:48
52BLAKE2: simpler, smaller, fast as MD5 Jean-Philippe Aumasson1 , Samuel Neves2 , Zooko Wilcox-O’Hearn3 , and Christian Winnerlein4 1  4

BLAKE2: simpler, smaller, fast as MD5 Jean-Philippe Aumasson1 , Samuel Neves2 , Zooko Wilcox-O’Hearn3 , and Christian Winnerlein4 1 4

Add to Reading List

Source URL: blake2.net

Language: English - Date: 2013-05-26 14:00:27
    53Int. J. of Applied Cryptography, Vol. 2, No. 4, Chosen-prefix collisions for MD5 and applications Marc Stevens

    Int. J. of Applied Cryptography, Vol. 2, No. 4, Chosen-prefix collisions for MD5 and applications Marc Stevens

    Add to Reading List

    Source URL: marc-stevens.nl

    Language: English - Date: 2013-01-18 07:46:32
      54Web- and Magento-Security Fabian Blechschmidt & Bastian Ike Dienstag, 4. Juni 13

      Web- and Magento-Security Fabian Blechschmidt & Bastian Ike Dienstag, 4. Juni 13

      Add to Reading List

      Source URL: ikonoshirt.de

      Language: English - Date: 2015-01-28 16:12:17
      55MD5 Considered Harmful Today Creating a rogue CA certificate

      MD5 Considered Harmful Today Creating a rogue CA certificate

      Add to Reading List

      Source URL: www.win.tue.nl

      - Date: 2008-12-31 08:06:44
        56Optimize HDFS Encrypted Transport Performance Introduction Currently HDFS encrypted transport is very slow. It utilizes SASL Digest-MD5 mechanism (use Qop: authconf), it supports three security strength:   

        Optimize HDFS Encrypted Transport Performance Introduction Currently HDFS encrypted transport is very slow. It utilizes SASL Digest-MD5 mechanism (use Qop: authconf), it supports three security strength:   

        Add to Reading List

        Source URL: issues.apache.org

          57Hašovací funkce, MD5 a cínský útok Obsah (1) ?

          Hašovací funkce, MD5 a cínský útok Obsah (1) ?

          Add to Reading List

          Source URL: crypto-world.info

          Language: Czech - Date: 2006-06-26 08:11:27
            58Fractional Treatment of Aging Skin with an Oscillatory Array of Micro-Tips at High Temperature Nathalie Fournier MD1, Gilbert Barnéon MD², Monica Elman MD3, Gary Lask MD4, Eric F. Bernstein MD5 (1) CLDP, Clapier, Franc

            Fractional Treatment of Aging Skin with an Oscillatory Array of Micro-Tips at High Temperature Nathalie Fournier MD1, Gilbert Barnéon MD², Monica Elman MD3, Gary Lask MD4, Eric F. Bernstein MD5 (1) CLDP, Clapier, Franc

            Add to Reading List

            Source URL: www.novoxel.com

            Language: English - Date: 2014-09-16 07:59:19
              59Eindhoven University of Technology Department of Mathematics and Computing Science MASTER’S THESIS  On Collisions for MD5

              Eindhoven University of Technology Department of Mathematics and Computing Science MASTER’S THESIS On Collisions for MD5

              Add to Reading List

              Source URL: homepages.cwi.nl

              Language: English - Date: 2009-06-17 12:19:40
                60Chosen-prefix collisions for MD5 and colliding X.509 certificates for different identities

                Chosen-prefix collisions for MD5 and colliding X.509 certificates for different identities

                Add to Reading List

                Source URL: www.iacr.org

                Language: English - Date: 2007-06-12 08:54:07