General discussion


Exploiting MD5 collisions

By ediaz ·
If you are not convinced that MD5 hash function is no longer adecuate for file verification, read this article:

Also on my blog I collected a lot of information about the hacking to MD5 function

This conversation is currently closed to new comments.

Thread display: Collapse - | Expand +

All Comments

Related Discussions

Related Forums