Marko Caric

  • Citations Per Year
Learn More
This paper presents preview of the new book titled “Security of Computer Systems and Networks” (original in Serbian language “Sigurnost računarskih sistema i mreža”) – textbook for University lectures, but also a book that covers majority of important areas concerning current state of security. The book is the result of lecturing experience, research in(More)
The modification of message that meets the sufficient conditions for collision is found in the last step of differential attack proposed by Wang et all. (2005) on MD4 hash algorithm. Here we show how this attack phase, finding a collision starting from the list of sufficient conditions for the collision, can be implemented using a combination of two(More)
  • 1