<--- Back to Details
First PageDocument Content
Integer factorization algorithms / AT&T / RSA Factoring Challenge / Bell Labs / Arjen / Cryptography / Lenstra / Telcordia Technologies / Alcatel-Lucent USA / Bell System / Alcatel-Lucent / Arjen Lenstra
Date: 2012-06-20 09:48:14
Integer factorization algorithms
AT&T
RSA Factoring Challenge
Bell Labs
Arjen
Cryptography
Lenstra
Telcordia Technologies
Alcatel-Lucent USA
Bell System
Alcatel-Lucent
Arjen Lenstra

Cryptographic Hash Workshop

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 19,65 KB

Share Document on Facebook

Similar Documents

Cryptography / Public-key cryptography / Cryptographic hash functions / Key management / Cryptographic protocols / Public key infrastructure / MD5 / X.509 / Public key fingerprint / Collision resistance / MerkleDamgrd construction / SHA-2

MD5 considered harmful today Creating a rogue CA certificate December 30, 2008 Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger

DocID: 1xUUG - View Document

Fourth European Tcl/Tk User Meeting, May 2003, Nuremburg Applying the text widget Arjen Markus1 WL | Delft Hydraulics PO Box 177

DocID: 1v5XB - View Document

The dynamics of modulated wave trains Arjen Doelman Bj¨orn Sandstede Arnd Scheel Guido Schneider

DocID: 1uVhC - View Document

Drawing diagrams Arjen Markus1 WL|Delft Hydraulics Introduction Much software today is geared to interactive use and graphical user-interfaces abound, especially

DocID: 1uSVn - View Document

Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities version 1.1, 4th November 2006 Marc Stevens1 , Arjen Lenstra2 , and Benne de Weger1 1

DocID: 1uBX7 - View Document