about
Interpreting Hash Function Security ProofsProtecting privacy in a clinical data warehouse.Multiplex congruence network of natural numbersModified Newton-Raphson GRAPE methods for optimal control of spin systems.New Second-Preimage Attacks on Hash FunctionsHerding Hash Functions and the Nostradamus AttackA Cost Effective and Preventive Approach to Avoid Integration Faults Caused by Mistakes in Distribution of Software ComponentsSecurity Requirements for Multimedia Archives
P2860
Q21740570-CE652D6C-4C88-40F8-90DC-74A9963C2DF0Q30858842-013A266D-D194-4AE4-BA3D-E505F112BA4FQ36747957-7504B687-54D8-42D9-9255-E54E22578FF8Q50634817-39E9ED09-16B6-49C4-ACAA-FAC3C7029C18Q57006271-E982F161-3D46-4D1D-A4D0-F562D4386B73Q57006297-FD001F6B-49BA-46F3-A0B0-9DF4C70446F0Q59052867-7ABE5D0E-808C-43DD-90A1-40FA8B85D510Q59102014-42C57409-D824-440A-A290-6CD1B5C6AA31
P2860
description
2005 nî lūn-bûn
@nan
2005 թուականին հրատարակուած գիտական յօդուած
@hyw
2005 թվականին հրատարակված գիտական հոդված
@hy
2005年学术文章
@wuu
2005年学术文章
@zh-cn
2005年学术文章
@zh-hans
2005年学术文章
@zh-my
2005年学术文章
@zh-sg
2005年學術文章
@yue
2005年學術文章
@zh
name
How to Break MD5 and Other Hash Functions
@ast
How to Break MD5 and Other Hash Functions
@en
type
label
How to Break MD5 and Other Hash Functions
@ast
How to Break MD5 and Other Hash Functions
@en
prefLabel
How to Break MD5 and Other Hash Functions
@ast
How to Break MD5 and Other Hash Functions
@en
P3181
P356
P1476
How to Break MD5 and Other Hash Functions
@en
P3181
P356
10.1007/11426639_2
P407
P577
2005-01-01T00:00:00Z