<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Cryptographic hash functions / Key management / Cryptographic protocols / Public key infrastructure / MD5 / X.509 / Public key fingerprint / Collision resistance / MerkleDamgrd construction / SHA-2
Date: 2018-01-29 20:02:27
Cryptography
Public-key cryptography
Cryptographic hash functions
Key management
Cryptographic protocols
Public key infrastructure
MD5
X.509
Public key fingerprint
Collision resistance
MerkleDamgrd construction
SHA-2

MD5 considered harmful today Creating a rogue CA certificate December 30, 2008 Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger

Add to Reading List

Source URL: infoscience.epfl.ch

Download Document from Source Website

File Size: 1,75 MB

Share Document on Facebook

Similar Documents