Enhancing MD5 hash algorithm using symmetric key encryption
暂无分享,去创建一个
[1] Richa Purohit,et al. A Survey on Recent Cryptographic Hash Function Designs , 2013 .
[2] Xiaorui Chan,et al. Discussion of One Improved Hash Algorithm Based on MD5 and SHA1 1 , 2007 .
[3] Praveen Gauravaram,et al. Cryptographic hash functions : cryptanalysis, design and applications , 2007 .
[4] Libor Sarga,et al. Security Review of the SHA-1 and MD 5 Cryptographic Hash Algorithms , 2013 .
[5] Bart Preneel,et al. Cryptographic hash functions , 2010, Eur. Trans. Telecommun..
[6] Mihir Bellare,et al. Hash Function Balance and Its Impact on Birthday Attacks , 2004, EUROCRYPT.
[7] Marc Stevens,et al. Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate , 2009, CRYPTO.
[8] Marc Stevens,et al. Fast Collision Attack on MD5 , 2006, IACR Cryptol. ePrint Arch..
[9] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .