Difference between revisions of "MD5"
From The ECRYPT Hash Function Website
(→Others) |
(→Others) |
||
Line 34: | Line 34: | ||
=== Others === | === Others === | ||
+ | <bibtex> | ||
@inproceedings{fseBlackCH06, | @inproceedings{fseBlackCH06, | ||
author = {John Black and Martin Cochran and Trevor Highland}, | author = {John Black and Martin Cochran and Trevor Highland}, | ||
Line 58: | Line 59: | ||
where we should direct future efforts in order to produce even stronger primitives.} | where we should direct future efforts in order to produce even stronger primitives.} | ||
} | } | ||
+ | </bibtex> |
Revision as of 10:31, 11 March 2008
Contents
1 Specification
2 Cryptanalysis
2.1 Best Known Results
2.2 Generic Attacks
2.3 Collision Attacks
2.4 Second Preimage Attacks
2.5 Preimage Attacks
2.6 Others
John Black, Martin Cochran, Trevor Highland - A Study of the MD5 Attacks: Insights and Improvements