{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T13:03:45Z","timestamp":1771333425306,"version":"3.50.1"},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Sci Technol"],"published-print":{"date-parts":[[2007,1]]},"DOI":"10.1007\/s11390-007-9010-1","type":"journal-article","created":{"date-parts":[[2007,2,9]],"date-time":"2007-02-09T18:31:12Z","timestamp":1171045872000},"page":"79-87","source":"Crossref","is-referenced-by-count":30,"title":["Improved Collision Attack on Hash Function MD5"],"prefix":"10.1007","volume":"22","author":[{"given":"Jie","family":"Liang","sequence":"first","affiliation":[]},{"given":"Xue-Jia","family":"Lai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,2,14]]},"reference":[{"key":"9010_CR1","doi-asserted-by":"crossref","unstructured":"Ronald Rivest. The MD5 message digest algorithm. RFC1321, April 1992, http:\/\/rfc.net\/rfc1321.html .","DOI":"10.17487\/rfc1321"},{"key":"9010_CR2","doi-asserted-by":"crossref","unstructured":"Ronald Rivest. The MD4 message digest algorithm. RFC1320, April 1992, http:\/\/rfc.net\/rfc1320.html .","DOI":"10.17487\/rfc1320"},{"key":"9010_CR3","doi-asserted-by":"crossref","unstructured":"B den Boer, A. Bosselaers. Collisions for the compression function of MD5. In Proc. Advances in Cryptology, EUROCRYPT\u201993, LNCS 765, Helleseth T (ed.), Springer-Verlag, Berlin, Germany, 1994, pp.293\u2013304.","DOI":"10.1007\/3-540-48285-7_26"},{"key":"9010_CR4","unstructured":"Dobbertin H. Cryptanalysis of MD5 compress. Rump session of Eurocrypt\u201996, http:\/\/www.cs.ucsd.edu\/users\/bsy\/dobbertin.ps, 1996 ."},{"key":"9010_CR5","unstructured":"Xiaoyun Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu. Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD. Rump session of Crypto\u201904, Cryptology ePrint Archive, Report2004\/199, http:\/\/eprint.iacr.org\/2004\/199.pdf , 2004."},{"key":"9010_CR6","doi-asserted-by":"crossref","unstructured":"Xiaoyun Wang, Hongbo Yu. How to break MD5 and other hash functions. In Proc. Advances in Crytolog\u2014EUROCRYPT 2005, LNCS3494, Cramer R (ed.), Springer-Verlag, pp.19\u201335.","DOI":"10.1007\/11426639_2"},{"key":"9010_CR7","unstructured":"Vlastimil Klima. Finding MD5 collisions on a notebook PC using multi-message modifications. In Proc. International Scientific Conference Security and Protection of Information 2005, Brno, Czech Republic, May 3\u20135, 2005, http:\/\/eprint.iacr.org\/2005\/102.pdf ."},{"key":"9010_CR8","unstructured":"Patrick Stach. MD5 Collision Generator. \u2329pstach@stachliu.com\u232a, http:\/\/www.stachliu.com.nyud.net:8090\/md5coll.c ."},{"key":"9010_CR9","doi-asserted-by":"crossref","unstructured":"Vlastimil Klima. Finding MD5 collisions\u2014A toy for a notebook. Cryptology ePrint Archive, Report2005\/075, March, 2005, http:\/\/eprint.iacr.org\/2005\/075.pdf .","DOI":"10.1088\/1126-6708\/2005\/08\/075"},{"issue":"2","key":"9010_CR10","first-page":"140","volume":"11","author":"Zhang-Yi Wang","year":"2006","unstructured":"Zhang-Yi Wang, Huan-Guo Zhang, Zhong-Ping Qin, Qing-Shu Meng. A fast attack on the MD5 hash function. Journal of Shanghai Jiaotong University, 2006, 11(2): 140\u2013145, 151.","journal-title":"Journal of Shanghai Jiaotong University"},{"key":"9010_CR11","unstructured":"Jun Yajima, Takeshi Shimoyama. Wang\u2019s sufficient conditions of MD5 are not sufficient. Cryptology ePrint Archive, Report2005\/263, 2005, http:\/\/eprint.iacr.org\/2005\/263.pdf ."},{"key":"9010_CR12","doi-asserted-by":"crossref","unstructured":"Xiaoyun Wang, Xuejia Lai, Dengguo Feng. Cryptanalysis of the hash functions MD4 and RIPEMD. In Proc. Advances in Cryptology\u2014EUROCRYPT 2005, LNCS 3494, Cramer R (ed.), Springer-Verlag, 2005, pp.1\u201318.","DOI":"10.1007\/11426639_1"},{"key":"9010_CR13","unstructured":"Yu Sasaki, Yusuke Naito, Noboru Kunihiro, Kazuo Ohta. Improved collision attack on MD5. Cryptology ePrint Archive, Report2005\/400, Nov, 2005, http:\/\/eprint.iacr.org\/2005\/400.pdf ."}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-007-9010-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-007-9010-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-007-9010-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:32:38Z","timestamp":1559399558000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-007-9010-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,1]]},"references-count":13,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,1]]}},"alternative-id":["9010"],"URL":"https:\/\/doi.org\/10.1007\/s11390-007-9010-1","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,1]]}}}