How to Break MD5 and Other Hash Functions

@inproceedings{Wang2005HowTB,
  title={How to Break MD5 and Other Hash Functions},
  author={Xiaoyun Wang and Hongbo Yu},
  booktitle={EUROCRYPT},
  year={2005}
}
MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and its security was widely studied since then by several authors. The best known result so far was a semi free-start collision, in which the initial value of the hash function is replaced by a non-standard value, which is the result… CONTINUE READING

6 Figures & Tables

Statistics

050100'04'06'08'10'12'14'16'18
Citations per Year

1,283 Citations

Semantic Scholar estimates that this publication has 1,283 citations based on the available data.

See our FAQ for additional information.