On Mar 26, 2006, at 22:07, Joseph Ashwood wrote:
- Original Message - From: "J. Bruce Fields"
<[EMAIL PROTECTED]>
Subject: Re: Creativity and security
On Fri, Mar 24, 2006 at 06:47:07PM -, Dave Korn wrote:
IOW, unless we're talking about a corrupt employee with a
photograph
Hi all,
according to my paper "Tunnels in Hash Functions: MD5 Collisions
Within a Minute" I programmed tunnels for searching the second
block of MD5 collision message also. In the zero version of the
program I used tunnels only in the first block to demonstrate the
method.
It took 23 seconds, now
On Sun, 26 Mar 2006 19:07:07 -0800, "Joseph Ashwood" <[EMAIL PROTECTED]>
wrote:
> - Original Message -
> From: "J. Bruce Fields" <[EMAIL PROTECTED]>
> Subject: Re: Creativity and security
>
>
> > On Fri, Mar 24, 2006 at 06:47:07PM -, Dave Korn wrote:
> >> IOW, unless we're talking