Author:
Stevens Marc,Sotirov Alexander,Appelbaum Jacob,Lenstra Arjen,Molnar David,Osvik Dag Arne,de Weger Benne
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. Lecture Notes in Computer Science;B. Boer den,1994
2. Diffie, W.: Personal communication (January 2009)
3. Dobbertin, H.: Cryptanalysis of MD5 Compress (May 1996), http://www-cse.ucsd.edu/~bsy/dobbertin.ps
4. Lecture Notes in Computer Science;S. Halevi,2006
5. Klima, V.: Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications, Cryptology ePrint Archive, Report 2005/102
Cited by
102 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Secure Archival is Hard... Really Hard;Proceedings of the 16th ACM Workshop on Hot Topics in Storage and File Systems;2024-07-08
2. Correcting-Block Attack;Encyclopedia of Cryptography, Security and Privacy;2024
3. Cryptographic Competitions;Journal of Cryptology;2023-12-08
4. A Review on Reading of Text Hidden in Image Using Steganography;Research Journal of Engineering and Technology;2023-06-30
5. Devils in Your Apps: Vulnerabilities and User Privacy Exposure in Mobile Notification Systems;2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN);2023-06