Marc Stevens

Results: 50



#Item
31

PDF Document

Add to Reading List

Source URL: marc-stevens.nl

Language: English - Date: 2009-06-17 12:32:45
    32

    Efficient Doubling on Genus Two Curves over Binary Fields Tanja Lange1, and Marc Stevens2, 1 Institute for Information Security and Cryptology (ITSC), Ruhr-Universit¨

    Add to Reading List

    Source URL: marc-stevens.nl

    Language: English - Date: 2009-06-17 12:34:52
      33

      Int. J. of Applied Cryptography, Vol. 2, No. 4, Chosen-prefix collisions for MD5 and applications Marc Stevens

      Add to Reading List

      Source URL: marc-stevens.nl

      Language: English - Date: 2013-01-18 07:46:32
        34Collision attack / X.509 / Arjen Lenstra / Transport Layer Security / Alexander Sotirov / Crypt / Cryptography / Cryptographic protocols / MD5

        Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate Marc Stevens Alexander Sotirov Jacob Appelbaum

        Add to Reading List

        Source URL: www.iacr.org

        Language: English - Date: 2009-09-22 18:23:04
        35MD5 / Search algorithms / Collision attack / Hash function / Padding / SHA-1 / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Hashing

        Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands January 29, 2012

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2012-01-29 17:14:50
        36Economics / United Nations / Political corruption / Accountability / Governance / Political philosophy / Good governance / Earth system governance / Earth System Governance Project / Development / Politics / International development

        Policy Brief #3 Integrating Governance into the Sustainable Development Goals Frank Biermann, Casey Stevens, Steven Bernstein, Aarti Gupta, Ngeta Kabiri, Norichika Kanie, Marc Levy, Måns Nilsson, László Pintér,

        Add to Reading List

        Source URL: conferences.asucollegeoflaw.com

        Language: English
        37Search algorithms / Hashing / Preimage attack / Merkle–Damgård construction / Hash function / Alexander Sotirov / Cryptographic hash functions / Cryptography / MD5

        MD5 considered harmful today Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger Presentation by: Hamidhasan G. Ahmed

        Add to Reading List

        Source URL: www.cis.upenn.edu

        Language: English - Date: 2013-09-26 13:48:46
        38Search algorithms / MD4 / Cryptographic hash function / Collision attack / Crypt / Hash function / Q / Cryptography / Hashing / MD5

        Fast Collision Attack on MD5 Marc Stevens Department of Mathematics and Computer Science, Eindhoven University of Technology P.O. Box 513, 5600 MB Eindhoven, The Netherlands.

        Add to Reading List

        Source URL: www.win.tue.nl

        Language: English - Date: 2006-03-17 08:25:34
        39Search algorithms / MD4 / Cryptographic hash function / Collision attack / Crypt / Hash function / Q / Cryptography / Hashing / MD5

        Fast Collision Attack on MD5 Marc Stevens Department of Mathematics and Computer Science, Eindhoven University of Technology P.O. Box 513, 5600 MB Eindhoven, The Netherlands.

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2006-03-17 14:14:33
        40Behavioural sciences / Philosophy of mind / Cognitive science / Interdisciplinary fields / Human behavior / Marc Bekoff / Consciousness / Animal cognition / Cognitive ethology / Behavior / Biology / Ethology

        Cognitive Relatives and Moral Relations Colin Allen, Department of Philosophy, Texas A&M University [removed] For Beck, B.B., Stoinski, T.S., Hutchins, M., Maple, T.S., Norton, B., Rowan, A., Stevens, B.F. & A

        Add to Reading List

        Source URL: cogprints.org

        Language: English - Date: 2009-12-08 15:35:52
        UPDATE