Back to Results
First PageMeta Content
SHA-1 / MD4 / Collision attack / Padding / Hash function / Crypt / HAVAL / Cryptographic hash functions / Cryptography / MD5


How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan[removed], China
Add to Reading List

Document Date: 2008-01-14 02:29:28


Open Document

File Size: 239,86 KB

Share Result on Facebook

Company

IBM / /

Country

China / /

Currency

pence / /

/

Facility

Hongbo Yu Shandong University / /

IndustryTerm

e-cash / compression algorithm / cryptographic protocols / /

Organization

International Association for Cryptologic Research / Shandong University / Jinan / /

Person

Ron Rivest / /

SportsLeague

International Association / /

Technology

cryptography / compression algorithm / /

SocialTag