General discussion


Exploiting MD5 collisions

By ediaz ·
If you are not convinced that MD5 hash function is no longer adecuate for file verification, read this article:

Also on my blog I collected a lot of information about the hacking to MD5 function

This conversation is currently closed to new comments.

0 total posts (Page 1 of 1)  
Thread display: Collapse - | Expand +

All Comments

Back to Security Forum
0 total posts (Page 1 of 1)  

Related Discussions

Related Forums