-
1
-
-
33746706791
-
-
Black, J., Cochran, M., Highland, T.: A Study of the MD5 Attacks: Insights and Improvements. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, 4047, pp. 262-277. Springer, Heidelberg (2006)
-
Black, J., Cochran, M., Highland, T.: A Study of the MD5 Attacks: Insights and Improvements. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol. 4047, pp. 262-277. Springer, Heidelberg (2006)
-
-
-
-
2
-
-
84985796089
-
-
den Boer, B., Bosselaers, A.: Collisions for the Compression Function of MD5. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, 765, pp. 293-304. Springer, Heidelberg (1994)
-
den Boer, B., Bosselaers, A.: Collisions for the Compression Function of MD5. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 293-304. Springer, Heidelberg (1994)
-
-
-
-
3
-
-
77649243367
-
Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions
-
Lai, X, Chen, K, eds, ASlACRYPT 2006, Springer, Heidelberg
-
Contini, S., Yin, Y.L.: Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions. In: Lai, X., Chen, K. (eds.) ASlACRYPT 2006. LNCS, vol. 4284, pp. 37-53. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 37-53
-
-
Contini, S.1
Yin, Y.L.2
-
4
-
-
43149100472
-
Hash Collisions (The Poisoned Message Attack) The Story of Alice and her Boss
-
Daum, M., Lucks, S.: Hash Collisions (The Poisoned Message Attack) The Story of Alice and her Boss. In: Eurocrypt 2005 (2005). http://th.informatik. uni-mannheim.de/people/lucks/HashCollisions/
-
(2005)
Eurocrypt
-
-
Daum, M.1
Lucks, S.2
-
5
-
-
0342586737
-
Cryptanalysis of MD5 compress
-
Dobbertin, H.: Cryptanalysis of MD5 compress. In: Eyrocrypt 1996 (1996)
-
(1996)
Eyrocrypt
-
-
Dobbertin, H.1
-
7
-
-
0013194031
-
-
Basic and Digest Access Authentication, RFC 2617, June
-
Franks, J., Hallam-Baker, P., Hostetler, J., Lawrence, S., Leach, P., Luotonen, A., Stewart, L.: HTTP Authentication: Basic and Digest Access Authentication, RFC 2617, June 1999(1999), http://www.ietf.org/rfc/rfc2617.txt
-
(1999)
HTTP Authentication
-
-
Franks, J.1
Hallam-Baker, P.2
Hostetler, J.3
Lawrence, S.4
Leach, P.5
Luotonen, A.6
Stewart, L.7
-
8
-
-
77952415887
-
-
Gebhardt, M., lilies, G., Schindler, W.: A note on the practical value of single hash collisions for special file formats. In: Dittmann, J. (ed.) Sicherheit, GI. LNI, 77, pp. 333-344 (2006)
-
Gebhardt, M., lilies, G., Schindler, W.: A note on the practical value of single hash collisions for special file formats. In: Dittmann, J. (ed.) Sicherheit, GI. LNI, vol. 77, pp. 333-344 (2006)
-
-
-
-
9
-
-
34548114558
-
Tunnels in Hash Functions: MD5 Collisions Within a Minute
-
Klima, V.: Tunnels in Hash Functions: MD5 Collisions Within a Minute. Cryptology ePrint Archive, Report, /105. (2006), http://eprint.iacr.org/2006/ 105.pdf
-
(2006)
Cryptology ePrint Archive, Report, /105
-
-
Klima, V.1
-
10
-
-
26444521554
-
-
Lenstra, A.K., de Weger, B.: On the possibility of constructing meaningful hash collisions for public keys. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, 3574, pp. 267-279. Springer. Heidelberg (2005)
-
Lenstra, A.K., de Weger, B.: On the possibility of constructing meaningful hash collisions for public keys. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 267-279. Springer. Heidelberg (2005)
-
-
-
-
11
-
-
38149073454
-
-
Leurent, G.: Message Freedom in MD4 and MD5 Collisions: Application to APOP. In: Biryukov. A. (ed.) FSE 2007. LNCS. 4593, pp. 309-328. Springer, Heidelberg (2007)
-
Leurent, G.: Message Freedom in MD4 and MD5 Collisions: Application to APOP. In: Biryukov. A. (ed.) FSE 2007. LNCS. vol. 4593, pp. 309-328. Springer, Heidelberg (2007)
-
-
-
-
14
-
-
43149087933
-
-
Myers, J, Rose, M, Post Office Protocol, Version 3. RFC 1939 Standard, May 1996. Updated by RFCs 1957, 2449
-
Myers, J., Rose, M.: Post Office Protocol - Version 3. RFC 1939 (Standard), May 1996. Updated by RFCs 1957, 2449, http://www.ietf.org/rfc/ rfc1939.txt
-
-
-
-
15
-
-
84947934697
-
On the Security of Two MAC Algorithms
-
Maurer, U.M, ed, EUROCRYPT 1996, Springer, Heidelberg
-
Preneel, B., van Oorschot, P.C.: On the Security of Two MAC Algorithms. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 19-32. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 19-32
-
-
Preneel, B.1
van Oorschot, P.C.2
-
16
-
-
0037984544
-
-
RFC 3261, June 2002 2002
-
Rosenberg, J., Schulzrinne, H., Oamarillo. G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol, RFC 3261, June 2002 (2002), http://www.ietf.org/rfc/rfc3261.txt
-
SIP: Session Initiation Protocol
-
-
Rosenberg, J.1
Schulzrinne, H.2
Oamarillo, G.3
Johnston, A.4
Peterson, J.5
Sparks, R.6
Handley, M.7
Schooler, E.8
-
17
-
-
43149121477
-
-
Sasaki, Y., Naito, Y., Kunihiro, N., Ohta, K.: Improved, collision attack on MD5. Cryptology ePrint Archive. Report 2005/400. http://eprint.iacr.org/ 2005/400
-
Sasaki, Y., Naito, Y., Kunihiro, N., Ohta, K.: Improved, collision attack on MD5. Cryptology ePrint Archive. Report 2005/400. http://eprint.iacr.org/ 2005/400
-
-
-
-
18
-
-
33846464690
-
Improved Collision Attacks on MD4 and MD5
-
The initial result was announced as [17
-
Sasaki, Y.. Naito, Y., Kunihiro, N., Ohta, K.: Improved Collision Attacks on MD4 and MD5. IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences (Japan), E90-A(1), 36-47 (2007) (The initial result was announced as [17])
-
(2007)
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences (Japan)
, vol.E90-A
, Issue.1
, pp. 36-47
-
-
Sasaki, Y.1
Naito, Y.2
Kunihiro, N.3
Ohta, K.4
-
19
-
-
38149064346
-
Practical Password Recovery on an MD5 Challenge and Response. Cryptology ePrint Archive
-
Report 2007/101
-
Sasaki, Y., Yamamoto, G., Aoki, K.: Practical Password Recovery on an MD5 Challenge and Response. Cryptology ePrint Archive, Report 2007/101
-
-
-
Sasaki, Y.1
Yamamoto, G.2
Aoki, K.3
-
20
-
-
38049156019
-
-
Stevens, M., Lenstra, A., der Weger. B.: Chosen-prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, 4515, pp. 1-12. Springer, Heidelberg (2007)
-
Stevens, M., Lenstra, A., der Weger. B.: Chosen-prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 1-12. Springer, Heidelberg (2007)
-
-
-
-
21
-
-
24944591357
-
How to Break MD5 and Other Hash Functions
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
|