First Page | Document Content | |
---|---|---|
Date: 2005-11-09 16:49:02 | How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, , Abstract. MD5 is one of the most widely used cryptographic hash functAdd to Reading ListSource URL: merlot.usc.eduDownload Document from Source WebsiteFile Size: 184,44 KBShare Document on Facebook |