Cryptology ePrint Archive: Report 2009/223

Available versions in chronological order


How To Find Weak Input Differences For MD5 Collision Attacks
Tao Xie and Dengguo Feng
Publication Info: No publication

How To Find Weak Input Differences For MD5 Collision Attacks
Tao Xie and Dengguo Feng
Publication Info: No publication

How To Find Weak Input Differences For MD5 Collision Attacks
Tao Xie and Dengguo Feng
Publication Info: No publication

The First 1-Block Collision Attack on MD5 and Call For a Challedge
Tao Xie and Dengguo Feng
Publication Info: No publication

How To Find Weak Input Differences For MD5 Collision Attacks
Tao Xie and Dengguo Feng
Publication Info: No publication


[ Cryptology ePrint archive ]