MD5

Results: 480



#Item
171Boomerang attack / SHA-1 / Blake / Differential cryptanalysis / SHA-2 / Boomerang / MD5 / Differential equation / Error detection and correction / Cryptography / Cryptographic hash functions

The Boomerang Attacks on BLAKE and BLAKE2 Yonglin Hao Department of Computer Science and Technology, Tsinghua Universtiy, Beijing, China Abstract. In this paper, we study the securit

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-18 20:17:27
172Mathematics / Merkle–Damgård construction / Hash function / Preimage attack / MD5 / SHA-1 / SHA-2 / Entropy / Collision attack / Cryptography / Cryptographic hash functions / Error detection and correction

Active Domain Expansion for Narrow-pipe Hash Xigen Yao Wuxi Hengqi Electromechanical Device Co.Ltd.China email : November 30, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-11-29 17:20:16
173Search algorithms / MD4 / Cryptographic hash function / Collision attack / Crypt / Hash function / Q / Cryptography / Hashing / MD5

Fast Collision Attack on MD5 Marc Stevens Department of Mathematics and Computer Science, Eindhoven University of Technology P.O. Box 513, 5600 MB Eindhoven, The Netherlands.

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2006-03-17 08:25:34
174SHA-1 / Collision attack / MD5 / Keccak / Hash function / Preimage attack / SHA-2 / Differential cryptanalysis / Error detection and correction / Cryptographic hash functions / Cryptography

Cryptanalysis of RadioGat´ un Thomas Fuhr1 and Thomas Peyrin2 1 DCSSI Labs

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-19 11:45:40
175Checksum / Electronic Common Technical Document / MD5 / Cryptographic hash function / Cksum / Sum / Simple file verification / Computing / Software / Unix

Microsoft Word - File Security - MD5 v1_0-hwm.doc

Add to Reading List

Source URL: estri.org

Language: English - Date: 2012-06-05 01:13:02
176MD5 / Pseudorandom function family / Pseudorandomness / Cryptographic hash function / Initialization vector / Integrated Encryption Scheme / Cryptography / Block cipher / Advantage

A preliminary version of this paper appeared in Advances in Cryptology – Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995. XOR MACs: New Methods for Message A

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2005-02-28 15:02:35
177SHA-1 / MD4 / MD5 / Differential cryptanalysis / RIPEMD / Hamming weight / A5/1 / ICE / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

Finding good differential patterns for attacks on SHA-1 Krystian Matusiewicz and Josef Pieprzyk Centre for Advanced Computing - Algorithms and Cryptography, Department of Computing, Macquarie University, Sydney, NSW 2109

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-19 18:19:12
178Checksum / Electronic Common Technical Document / MD5 / Cryptographic hash function / Cksum / Sum / Simple file verification / Computing / Software / Unix

Microsoft Word - File Security - MD5 v1_0-hwm.doc

Add to Reading List

Source URL: estri.ich.org

Language: English - Date: 2012-06-04 19:13:02
179Search algorithms / MD4 / Cryptographic hash function / Collision attack / Crypt / Hash function / Q / Cryptography / Hashing / MD5

Fast Collision Attack on MD5 Marc Stevens Department of Mathematics and Computer Science, Eindhoven University of Technology P.O. Box 513, 5600 MB Eindhoven, The Netherlands.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-03-17 14:14:33
180Electronic commerce / MD5 / Hashing / Collision attack / X.509 / SHA-1 / Padding / Collision / Preimage attack / Cryptography / Public-key cryptography / Cryptographic hash functions

Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities version 1.1, 4th November 2006 Marc Stevens1 , Arjen Lenstra2 , and Benne de Weger1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-05 01:53:21
UPDATE