How to Break MD5 and Other Hash Functions

  title={How to Break MD5 and Other Hash Functions},
  author={Xiaoyun Wang and Hongbo Yu},
MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and its security was widely studied since then by several authors. The best known result so far was a semi free-start collision, in which the initial value of the hash function is replaced by a non-standard value, which is the result… CONTINUE READING

6 Figures & Tables


Citations per Year

1,283 Citations

Semantic Scholar estimates that this publication has 1,283 citations based on the available data.

See our FAQ for additional information.