Back to Results
First PageMeta Content



1 MD5 To Be Considered Harmful Someday Dan Kaminsky Senior Security Consultant, Avaya
Add to Reading List

Document Date: 2004-12-06 19:52:41


Open Document

File Size: 54,59 KB

Share Result on Facebook

City

Vendor / /

Company

Amazon / Online Banking / Google / AOL / Yahoo / Trusting Trust / Microsoft / the AES / Avaya / /

Currency

USD / /

/

Event

Product Issues / Man-Made Disaster / Reorganization / /

IndustryTerm

file system auditing tool / digital signature algorithms / file server / large networks / hash algorithm / constant software load / adept auditor / concept tool / audited algorithms / still networks / search algorithms / build tools / distributed content network / Wireless Data / hash algorithms / arbitrary hashing algorithm / chosen algorithms / Internet Explorer / trustworthy algorithms / /

Movie

Fire and Ice / /

Person

Michael Paddon / Antoine Joux / Philip Hawkes / David Maynor / Andy Green Peter Barth / Hans Dobbertin / Stefan Lucks / Reuse / Ken Thompson / Jeff Mears / Gregory G. Rose / /

Position

automated package manager / Consultant / Messenger / particularly adept auditor / naive forensic analyst / human analyst / /

Product

MD5 / behavior / /

PublishedMedium

Cryptology ePrint Archive / /

Technology

RAM / hash algorithm / search algorithms / API / arbitrary hashing algorithm / VPN / MAC address / P2P / MD5 algorithm / PRIVATE KEY / perl / MP3 / aggressively audited algorithms / pdf / MPEG-1 / peer to peer / hash algorithms / chosen algorithms / http / digital signature algorithms / hashing algorithm / digital signature / Authenticode technology / /

URL

www.lucidx.com / /

SocialTag