Information Security and Privacy
From MaRDI portal
Publication:5473545
DOI10.1007/B137750zbMATH Open1127.94349OpenAlexW4299378192MaRDI QIDQ5473545FDOQ5473545
Benne de Weger, Arjen K. Lenstra
Publication date: 22 June 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b137750
Recommendations
- Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities
- scientific article; zbMATH DE number 4057439
- Chosen-prefix collisions for MD5 and applications
- Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate
- scientific article; zbMATH DE number 1024038
Cited In (9)
- Classical and Quantum Algorithms for Exponential Congruences
- Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack
- Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don’t Exist
- ON FINDING SOLUTIONS TO EXPONENTIAL CONGRUENCES
- Security analysis of randomize-hash-then-sign digital signatures
- Efficient Hash Collision Search Strategies on Special-Purpose Hardware
- Title not available (Why is that?)
- On Randomizing Hash Functions to Strengthen the Security of Digital Signatures
- Collisionful keyed hash functions with selectable collisions
This page was built for publication: Information Security and Privacy
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5473545)