Login / Signup
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners.
Florian Mendel
Christian Rechberger
Martin Schläffer
Published in:
ASIACRYPT (2009)
Keyphrases
</>
feature vectors
countermeasures
watermarking scheme
attack detection
malicious attacks
fixed length
security risks
variable length
similarity measure
data publishing
chosen plaintext
attack scenarios
data corruption
traffic analysis
security threats
security protocols
computer security