18 relations: ASCII, Collision attack, Comparison of cryptographic hash functions, Cryptographic hash function, Ed2k URI scheme, Hans Dobbertin, Hash function security summary, Hexadecimal, MD2 (cryptography), MD5, MD6, NT LAN Manager, Preimage attack, RIPEMD, Ron Rivest, Rsync, SHA-1, Xiaoyun Wang.
ASCII
ASCII, abbreviated from American Standard Code for Information Interchange, is a character encoding standard for electronic communication.
New!!: MD4 and ASCII · See more »
Collision attack
In cryptography, a collision attack on a cryptographic hash tries to find two inputs producing the same hash value, i.e. a hash collision.
New!!: MD4 and Collision attack · See more »
Comparison of cryptographic hash functions
The following tables compare general and technical information for a number of cryptographic hash functions.
New!!: MD4 and Comparison of cryptographic hash functions · See more »
Cryptographic hash function
A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.
New!!: MD4 and Cryptographic hash function · See more »
Ed2k URI scheme
In computing, eD2k links (ed2k://) are hyperlinks used to denote files stored on computers connected to the eDonkey filesharing P2P network.
New!!: MD4 and Ed2k URI scheme · See more »
Hans Dobbertin
Hans Dobbertin (April 17, 1952 – February 2, 2006) was a German cryptographer who is best known for his work on cryptanalysis of the MD4, MD5, and original RIPEMD hash functions, and for his part in the design of the new version of the RIPEMD hash function.
New!!: MD4 and Hans Dobbertin · See more »
Hash function security summary
This article summarizes publicly known attacks against cryptographic hash functions.
New!!: MD4 and Hash function security summary · See more »
Hexadecimal
In mathematics and computing, hexadecimal (also base, or hex) is a positional numeral system with a radix, or base, of 16.
New!!: MD4 and Hexadecimal · See more »
MD2 (cryptography)
The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989.
New!!: MD4 and MD2 (cryptography) · See more »
MD5
The MD5 algorithm is a widely used hash function producing a 128-bit hash value.
New!!: MD4 and MD5 · See more »
MD6
The MD6 Message-Digest Algorithm is a cryptographic hash function.
New!!: MD4 and MD6 · See more »
NT LAN Manager
In a Windows network, NT LAN Manager (NTLM) is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users.
New!!: MD4 and NT LAN Manager · See more »
Preimage attack
In cryptography, a preimage attack on cryptographic hash functions tries to find a message that has a specific hash value.
New!!: MD4 and Preimage attack · See more »
RIPEMD
RIPEMD (RACE Integrity Primitives Evaluation Message Digest) is a family of cryptographic hash functions developed in Leuven, Belgium, by Hans Dobbertin, Antoon Bosselaers and Bart Preneel at the COSIC research group at the Katholieke Universiteit Leuven, and first published in 1996.
New!!: MD4 and RIPEMD · See more »
Ron Rivest
Ronald Linn Rivest (born May 6, 1947) is a cryptographer and an Institute Professor at MIT.
New!!: MD4 and Ron Rivest · See more »
Rsync
rsync is a utility for efficiently transferring and synchronizing files across computer systems, by checking the timestamp and size of files.
New!!: MD4 and Rsync · See more »
SHA-1
In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest - typically rendered as a hexadecimal number, 40 digits long.
New!!: MD4 and SHA-1 · See more »
Xiaoyun Wang
Xiaoyun Wang (born 1966) is a researcher and professor in the Department of Mathematics and System Science, Shandong University, Shandong, China.
New!!: MD4 and Xiaoyun Wang · See more »