Back to Results
First PageMeta Content



How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, , Abstract. MD5 is one of the most widely used cryptographic hash funct
Add to Reading List

Document Date: 2005-11-09 16:49:02


Open Document

File Size: 184,44 KB

Share Result on Facebook

Company

IBM / /

Country

China / /

Currency

pence / /

/

Facility

Hongbo Yu Shandong University / /

IndustryTerm

e-cash / compression algorithm / cryptographic protocols / /

Organization

Shandong University / Jinan / /

Person

Ron Rivest / /

Technology

cryptography / compression algorithm / /

SocialTag