Sciweavers

6 search results - page 1 / 2
» A Study of the MD5 Attacks: Insights and Improvements
Sort
View
FSE
2006
Springer
137views Cryptology» more  FSE 2006»
13 years 8 months ago
A Study of the MD5 Attacks: Insights and Improvements
MD5 is a well-known and widely-used cryptographic hash function. It has received renewed attention from researchers subsequent to the recent announcement of collisions found by Wa...
John Black, Martin Cochran, Trevor Highland
EUROCRYPT
2005
Springer
13 years 10 months ago
How to Break MD5 and Other Hash Functions
Abstract. MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and its security was widely studied since then...
Xiaoyun Wang, Hongbo Yu
DSS
2006
75views more  DSS 2006»
13 years 4 months ago
Model alignment of anthrax attack simulations
This paper describes our experience aligning two simulation models of disease progression after biological attacks. The first model is the Incubation-Prodromal-Fulminant (IPF) mod...
Li-Chiou Chen, Kathleen M. Carley, Douglas B. Frid...
IMC
2007
ACM
13 years 6 months ago
On the impact of route monitor selection
Several route monitoring systems have been set up to help understand the Internet routing system. They operate by gathering realtime BGP updates from different networks. Many stud...
Ying Zhang, Zheng Zhang, Zhuoqing Morley Mao, Y. C...
SIGMETRICS
2006
ACM
104views Hardware» more  SIGMETRICS 2006»
13 years 10 months ago
Modeling adoptability of secure BGP protocols
Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the ...
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zh...