[1]
Zheng, Xiaoling. Research for the application and safety of MD5 algorithm in password authentication. Proceedings - 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2012, pp.2216-2219, (2012).
DOI: 10.1109/fskd.2012.6234010
Google Scholar
[2]
Wang, Feng. Constant memory optimizations in MD5 Crypt cracking algorithm on GPU-accelerated supercomputer using CUDA. ICCSE 2012 - Proceedings of 2012 7th International Conference on Computer Science and Education, pp.638-642, (2012).
DOI: 10.1109/iccse.2012.6295156
Google Scholar
[3]
Sasaki, Yu. Collisions of MMO-MD5 and their impact on original MD5. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 6737 LNCS, pp.117-133, (2011).
DOI: 10.1007/978-3-642-21969-6_8
Google Scholar
[4]
Yong-Xia, Zhao. MD5 research. 2010 International Conference on MultiMedia and Information Technology, MMIT 2010, v 2, pp.271-273, (2010).
DOI: 10.1109/mmit.2010.186
Google Scholar
[5]
Li, Ji-Rui. Online shopping system based on improved MD5. Communications in Computer and Information Science, v 307 CCIS, n PART 1, pp.51-57, (2012).
Google Scholar
[6]
Chen, Shi-Wei, Jin, Chen-Hui. New set of sufficient conditions for MD5 collisions. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, v 31, n 3, pp.740-744, March (2009).
Google Scholar
[7]
Shi, Zhicai, Yang, Canqun, Wu, Qiang. Scalable MD5 Crypt cracker on petascale supercomputer. Advanced Materials Research, v 532-533, pp.1080-1084, (2012).
DOI: 10.4028/www.scientific.net/amr.532-533.1080
Google Scholar