Marc Stevens
Marc Stevens
Scientific Researcher, Centrum Wiskunde & Informatica
Geverifieerd e-mailadres voor
TitelGeciteerd doorJaar
Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate
M Stevens, A Sotirov, J Appelbaum, A Lenstra, D Molnar, DA Osvik, ...
Advances in Cryptology-CRYPTO 2009, 55-69, 2009
Chosen-prefix collisions for MD5 and colliding X. 509 certificates for different identities
M Stevens, A Lenstra, B De Weger
Advances in Cryptology-EUROCRYPT 2007, 1-22, 2007
The first collision for full SHA-1
M Stevens, E Bursztein, P Karpman, A Albertini, Y Markov
Annual International Cryptology Conference, 570-596, 2017
MD5 considered harmful today - Creating a rogue CA Certificate
A Sotirov, M Stevens, J Appelbaum, A Lenstra, D Molnar, DA Osvik, ...
25th Chaos Communication Congress, Berlin, Germany, 2008
Fast Collision Attack on MD5.
M Stevens
IACR Cryptology ePrint Archive 2006, 104, 2006
New collision attacks on SHA-1 based on optimal joint local-collision analysis
M Stevens
Advances in Cryptology–EUROCRYPT 2013, 245-261, 2013
On collisions for MD5
M Stevens
TU Eindhoven MSc thesis, June. available at http://www. win. tue. nl …, 2007
Chosen-prefix collisions for MD5 and applications
M Stevens, AK Lenstra, B De Weger
International Journal of Applied Cryptography 2 (4), 322-359, 2012
Freestart Collision for Full SHA-1.
M Stevens, P Karpman, T Peyrin
EUROCRYPT (1), 459-483, 2016
Efficient doubling on genus two curves over binary fields
T Lange, M Stevens
Selected Areas in Cryptography, 170-181, 2005
Attacks on hash functions and applications
MMJ Stevens
Mathematical Institute, Faculty of Science, Leiden University, 2012
Practical free-start collision attacks on 76-step SHA-1
P Karpman, T Peyrin, M Stevens
Advances in Cryptology--CRYPTO 2015, 623-642, 2015
Single-block collision attack on MD5.
M Stevens
IACR Cryptology ePrint Archive 2012, 40, 2012
Predicting the winner of the 2008 US presidential elections using a Sony PlayStation 3
M Stevens, A Lenstra, B de Weger
Nov, 2007
M Stevens
Advances in Cryptology–CRYPTO 2013, 129-146, 2013
Vulnerability of software integrity and code signing applications to chosen-prefix collisions for MD5
M Stevens, A Lenstra, B de Weger
Nov 30, 2007, 2007
Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware
M Fillinger, M Stevens
Advances in Cryptology–ASIACRYPT 2015, 586-611, 2015
Cryptanalysis of MD5 & SHA-1
M Stevens
Proceedings of the Special-Purpose Hardware for Attacking Cryptographic …, 2012
Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions.
M Stevens, D Shumow
IACR Cryptology ePrint Archive 2017, 173, 2017
Technical Background on the Flame Collision Attack
M Stevens
CWI (Centrum Wiskunde & Informatica) News 7, 2012
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20