MD5 (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "MD5" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
5,032nd place
3,357th place
2nd place
2nd place
153rd place
151st place
9,054th place
6,363rd place
214th place
176th place
355th place
454th place
low place
low place
8,888th place
6,276th place
193rd place
152nd place
6th place
6th place
2,526th place
1,796th place
low place
low place
low place
low place
102nd place
76th place
786th place
558th place
4,521st place
4,877th place
321st place
724th place
low place
low place
low place
low place
low place
low place
low place
low place
1,077th place
761st place
272nd place
225th place
9,482nd place
6,202nd place
2,232nd place
1,903rd place
low place
low place
low place
low place
11th place
8th place
5,469th place
3,758th place
1,514th place
1,024th place

archive.org

arnes.si

ftp.arnes.si

bishopfox.com

ccc.de

events.ccc.de

cert.org

kb.cert.org

cnet.com

news.cnet.com

colorado.edu

cs.colorado.edu

doi.org

  • Rivest, R. (April 1992). "Step 4. Process Message in 16-Word Blocks". The MD5 Message-Digest Algorithm. IETF. p. 5. sec. 3.4. doi:10.17487/RFC1321. RFC 1321. Retrieved 10 October 2018.
  • Turner, Sean (March 2011). "RFC 6151 – Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms". Internet Engineering Task Force. doi:10.17487/RFC6151. Archived from the original on 15 June 2017. Retrieved 11 November 2013.
  • Rivest, Ronald L. (April 1992). "RFC 1321 – The MD5 Message-Digest Algorithm". Internet Engineering Task Force. doi:10.17487/RFC1321. hdl:1721.1/149165. Archived from the original on 9 April 2021. Retrieved 5 October 2013.
  • Krawczyk, Hugo; Bellare, Mihir; Canetti, Ran (February 1997). "RFC 2104 – HMAC: Keyed-Hashing for Message Authentication". Internet Engineering Task Force. doi:10.17487/RFC2104. Archived from the original on 15 April 2021. Retrieved 5 October 2013.
  • Yu Sasaki; Kazumaro Aoki (16 April 2009). "Finding Preimages in Full MD5 Faster Than Exhaustive Search". Advances in Cryptology - EUROCRYPT 2009. Lecture Notes in Computer Science. Vol. 5479. Springer Berlin Heidelberg. pp. 134–152. doi:10.1007/978-3-642-01001-9_8. ISBN 978-3-642-01000-2.
  • Ming Mao and Shaohui Chen and Jin Xu (2009). "Construction of the Initial Structure for Preimage Attack of MD5". 2009 International Conference on Computational Intelligence and Security. Vol. 1. IEEE Computer Society. pp. 442–445. doi:10.1109/CIS.2009.214. ISBN 978-0-7695-3931-7. S2CID 16512325.

epfl.ch

documents.epfl.ch

free.fr

bvernoux.free.fr

freebsd.org

handle.net

hdl.handle.net

iacr.org

eprint.iacr.org

ietf.org

tools.ietf.org

datatracker.ietf.org

  • Rivest, R. (April 1992). "Step 4. Process Message in 16-Word Blocks". The MD5 Message-Digest Algorithm. IETF. p. 5. sec. 3.4. doi:10.17487/RFC1321. RFC 1321. Retrieved 10 October 2018.

marc-stevens.nl

microsoft.com

support.microsoft.com

answers.microsoft.com

learn.microsoft.com

  • "certutil". certutil. Microsoft Learn. Archived from the original on 23 November 2023. Retrieved 23 November 2023.

referencesource.microsoft.com

nist.gov

csrc.nist.gov

nvlpubs.nist.gov

oracle.com

docs.oracle.com

python.org

mail.python.org

rtfm.com

schneier.com

semanticscholar.org

api.semanticscholar.org

silentsignal.eu

blog.silentsignal.eu

technet.com

blogs.technet.com

tue.nl

win.tue.nl

uni-mannheim.de

th.informatik.uni-mannheim.de

usc.edu

merlot.usc.edu

verisign.com

blogs.verisign.com

web.archive.org

wired.com

wired.com

blog.wired.com

zdnet.com