A Study of the MD5 Attacks: Insights and Improvements
- 1 January 2006
- book chapter
- Published by Springer Nature
- p. 262-277
- https://doi.org/10.1007/11799313_17
Abstract
No abstract availableKeywords
This publication has 7 references indexed in Scilit:
- How to Break MD5 and Other Hash FunctionsPublished by Springer Nature ,2005
- Cryptanalysis of the Hash Functions MD4 and RIPEMDPublished by Springer Nature ,2005
- Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision ResistancePublished by Springer Nature ,2004
- A Design Principle for Hash FunctionsPublished by Springer Nature ,2001
- Collisions for the compression function of MD5Published by Springer Nature ,1994
- The MD5 Message-Digest AlgorithmPublished by RFC Editor ,1992
- One Way Hash Functions and DESPublished by Springer Nature ,1990