MD5 Secured Cryptographic Hash Value
暂无分享,去创建一个
[1] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[2] Wilson Cheruiyot,et al. Enhanced Message Digest Version 5 Architecture for Secure Hashing , 2014 .
[3] Akash Kumar Mandal,et al. Analysis of Avalanche Effect in Plaintext of DES using Binary Codes , 2012 .
[4] Neyole Misiko Jacob. Vulnerability of data security using MD5 function in php database design , 2015 .
[5] Antoon Bosselaers,et al. Collisions for the Compressin Function of MD5 , 1994, EUROCRYPT.
[6] Dengguo Feng,et al. Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD , 2004, IACR Cryptol. ePrint Arch..
[7] Lars R. Knudsen,et al. Some Attacks Against a Double Length Hash Proposal , 2005, ASIACRYPT.
[8] Marc Stevens. Attacks on Hash Functions and Applications , 2012 .
[9] M. Kaps,et al. Concepts of experimental design. , 2004 .
[10] Jidong Jin,et al. Research for the application and safety of MD5 algorithm in password authentication , 2012, 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery.
[11] Yu Sasaki,et al. Finding Preimages in Full MD5 Faster Than Exhaustive Search , 2009, EUROCRYPT.
[12] Vlastimil Klíma,et al. Tunnels in Hash Functions: MD5 Collisions Within a Minute , 2006, IACR Cryptol. ePrint Arch..
[13] Sjsu ScholarWorks,et al. A Meaningful MD5 Hash Collision Attack , 2014 .
[14] Marc Stevens,et al. Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate , 2009, CRYPTO.
[15] A. K. Mandal,et al. Comparative study of Avalanche effect in DES using binary codes , 2012, 2012 NATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION SYSTEMS.
[16] Xie Nan-bin,et al. The Mixed Encryption Algorithm Based on MD5 and XOR Transformation , 2010, 2010 Second International Workshop on Education Technology and Computer Science.
[17] M.D.A. Chawdhury,et al. Security enhancement of MD5 hashed passwords by using the unused bits of TCP header , 2008, 2008 11th International Conference on Computer and Information Technology.