Cryptology ePrint Archive: Report 2009/223
Available versions in chronological order
20090530:041218 (posted 30-May-2009 04:12:18 UTC)
How To Find Weak Input Differences For MD5 Collision Attacks
Tao Xie and Dengguo Feng
Publication Info: No publication
20090530:101109 (posted 30-May-2009 10:11:09 UTC)
How To Find Weak Input Differences For MD5 Collision Attacks
Tao Xie and Dengguo Feng
Publication Info: No publication
20090530:102048 (posted 30-May-2009 10:20:48 UTC)
How To Find Weak Input Differences For MD5 Collision Attacks
Tao Xie and Dengguo Feng
Publication Info: No publication
20101216:032027 (posted 16-Dec-2010 03:20:27 UTC)
The First 1-Block Collision Attack on MD5 and Call For a Challedge
Tao Xie and Dengguo Feng
Publication Info: No publication
20101225:062937 (posted 25-Dec-2010 06:29:37 UTC)
How To Find Weak Input Differences For MD5 Collision Attacks
Tao Xie and Dengguo Feng
Publication Info: No publication
[
Cryptology ePrint archive
]