Click here to Skip to main content
11,637,662 members (68,912 online)
Click here to Skip to main content
Add your own
alternative version

Exploiting MD5 collisions (in C#)

, 20 Sep 2005 269.6K 3.2K 80
This article shows how the MD5 collisions can be used to tamper software distribution schemas.



Compare Revision Minor Date Status Editor
1 - publicly available No 20-Sep-05 12:16 Available Rinish Biju


This article has no explicit license attached to it but may contain usage terms in the article text or the download files themselves. If in doubt please contact the author via the discussion board below.

A list of licenses authors might use can be found here


About the Author

Web Developer
Chile Chile
Eduardo Diaz
personal blog

You may also be interested in...

| Advertise | Privacy | Terms of Use | Mobile
Web04 | 2.8.150728.1 | Last Updated 20 Sep 2005
Article Copyright 2005 by ediazc
Everything else Copyright © CodeProject, 1999-2015
Layout: fixed | fluid