共 8 条
[1]
Howto Construct Sufficient Conditionin Searching Collisions of MD5. Sasaki Y,Naito Y,Yaji ma Jet al. VIETCRYPT . 2006
[2]
On collisions for MD5. Stevens M. . 2007
[3]
Could the1-MSB input difference be the fastest collision attack for MD5. Xie Tao,Liu Fanbao,Feng Dengguo. Cryptology ePrint Archive .
[4]
Collisions for hash functions MD4,MD5,HAVAL-128and RIPEMD,rump session. Wang Xiaoyun,Feng Dengguo,Lai Xuejia,et al. Cryptology ePrint Archive,Report2004/199 .
[5]
Short chosen-prefix collisions for MD5and the creation of a rogue CA certifi-cate. Stevens M,Sotirov A,Appelbaum J,et al. Cryptology ePrint Archive Report2009/111 .
[6]
MD5considered harmful today. Alexander S,Stevens M,Appelbaum J,et al. . 2008
[7]
A new collision differential for MD5with its full differential path. Xie Tao,Feng Dengguo,Liu Fanbao. Cryptology ePrint Archive(2008/230) .
[8]
Cryptanalysis of Hash Functions of the MD4-Family. Magnus Daum. . 2005