Back to Results
First PageMeta Content
Crypt / Cryptographic hash functions / Computing / Applied mathematics / Cyberwarfare / Cryptography / Hashing / MD5


Wang’s sufficient conditions of MD5 are not sufficient Jun Yajima and Takeshi Shimoyama FUJITSU LABORATORIES LTD. {jyajima,shimo}@labs.fujitsu.com Abstract
Add to Reading List

Document Date: 2005-08-10 09:35:42


Open Document

File Size: 139,46 KB

Share Result on Facebook

/

IndustryTerm

message search / collision search / search algorithm / collision search algorithm / improvement algorithm / search algorithms / /

Person

Jun Yajima / /

PublishedMedium

Cryptology ePrint Archive / /

Technology

improvement algorithm / collision search algorithm / 2 Collision search algorithm / http / digital signature / Message-Digest Algorithm / 0 algorithm / following search algorithms / pdf / /

URL

http /

SocialTag