Difference between revisions of "MD5"
From The ECRYPT Hash Function Website
(→Others) |
(→Others) |
||
| Line 34: | Line 34: | ||
=== Others === | === Others === | ||
| + | <bibtex> | ||
@inproceedings{fseBlackCH06, | @inproceedings{fseBlackCH06, | ||
author = {John Black and Martin Cochran and Trevor Highland}, | author = {John Black and Martin Cochran and Trevor Highland}, | ||
| Line 58: | Line 59: | ||
where we should direct future efforts in order to produce even stronger primitives.} | where we should direct future efforts in order to produce even stronger primitives.} | ||
} | } | ||
| + | </bibtex> | ||
Revision as of 10:31, 11 March 2008
Contents
1 Specification
2 Cryptanalysis
2.1 Best Known Results
2.2 Generic Attacks
2.3 Collision Attacks
2.4 Second Preimage Attacks
2.5 Preimage Attacks
2.6 Others
John Black, Martin Cochran, Trevor Highland - A Study of the MD5 Attacks: Insights and Improvements