Workflows

Comments

1 Comment »

  1. MD5 Exploit

    I have built a proof of concept based on the this papers: * http://www.cits.rub.de/MD5Collisions/ * http://www.doxpara.com/md5_someday.pdf This image shows the proof of concept: The program generate 2 files, with the same MD5 value, but one extract a g…

    Trackback by Dark Side Programming — September 14, 2005 @ 11:55 pm


Leave a comment

XHTML: You can use these tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>