Collisions of MMO-MD5 and Their Impact on Original MD5
From MaRDI portal
Publication:3011908
DOI10.1007/978-3-642-21969-6_8zbMATH Open1280.94093OpenAlexW31368121MaRDI QIDQ3011908FDOQ3011908
Publication date: 29 June 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-21969-6_8
collisionMD5PGVDavies-Meyer modegiven-message collisionMatyas-Meyer-Oseas modeMiyaguchi-Preneel modeNMAC colliding keys
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Keying Hash Functions for Message Authentication
- Finding Collisions in the Full SHA-1
- Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
- How to Break MD5 and Other Hash Functions
- Finding SHA-1 Characteristics: General Results and Applications
- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)
- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
- Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities
- Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC
- New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners
- A New Type of 2-Block Collisions in MD5
- On Authentication with HMAC and Non-random Properties
- Preimage Attacks on Step-Reduced MD5
- Message Freedom in MD4 and MD5 Collisions: Application to APOP
- Cryptology and Network Security
- How to Construct Sufficient Conditions for Hash Functions
- A Study of the MD5 Attacks: Insights and Improvements
- Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack
Cited In (1)
Uses Software
This page was built for publication: Collisions of MMO-MD5 and Their Impact on Original MD5
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3011908)