Collision attack

Results: 186



#Item
1Cryptography / Cryptographic hash functions / MD5 / Q17 / MD4 / Q10 / Collision attack / Crypt

Fast Collision Attack on MD5 Marc Stevens Department of Mathematics and Computer Science, Eindhoven University of Technology P.O. Box 513, 5600 MB Eindhoven, The Netherlands.

Add to Reading List

Source URL: marc-stevens.nl

Language: English - Date: 2017-08-13 07:48:58
2

SHAttered The first concrete collision attack against SHA-1 https://shattered.io A collision is when two different documents have the same hash fingerprint

Add to Reading List

Source URL: shattered.io

- Date: 2017-02-21 16:44:42
    3

    SHAttered The first concrete collision attack against SHA-1 https://shattered.io A collision is when two different documents have the same hash fingerprint

    Add to Reading List

    Source URL: shattered.it

    - Date: 2017-02-21 16:44:42
      4

      SHAttered The first concrete collision attack against SHA-1 https://shattered.io A collision is when two different documents have the same hash fingerprint

      Add to Reading List

      Source URL: shattered.io

      - Date: 2017-02-21 16:44:42
        5

        Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands January 29, 2012

        Add to Reading List

        Source URL: marc-stevens.nl

        - Date: 2017-08-13 07:48:58
          6

          Attacks Against Permute-Transform-Xor Compression Functions and Spectral Hash Ethan Heilman August 26, 2009 Abstract This paper presents an attack on the strong collision resistance of the Spectral Hash SHA-3 candidate.

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2009-08-26 12:02:39
            7Domain name system / Web Proxy Autodiscovery Protocol / Generic top-level domain / .local / Root name server / Domain name / Proxy auto-config / Name server / Top-level domain / OpenDNS / .global / DNS zone

            MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era Qi Alfred Chen, Eric Osterweil† , Matthew Thomas†, Z. Morley Mao University of Michigan, † Verisign Labs alfchen@umich.

            Add to Reading List

            Source URL: www.verisign.com

            Language: English - Date: 2016-05-23 09:25:07
            8Cryptography / Secure communication / Cryptographic hash functions / Cryptographic protocols / Hashing / Transport Layer Security / Collision attack / Cipher suite / MD5 / OpenSSL / SHA-2 / Man-in-the-middle attack

            Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

            Add to Reading List

            Source URL: mitls.org

            Language: English - Date: 2016-01-06 07:34:05
            9Secure communication / Cryptographic hash functions / Cryptographic protocols / Transport Layer Security / Cryptography / Collision attack / Cipher suite / MD5 / OpenSSL / Challengeresponse authentication / Man-in-the-middle attack / SHA-2

            Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

            Add to Reading List

            Source URL: www.mitls.org

            Language: English - Date: 2016-01-06 07:34:05
            UPDATE