BlogHide Resteemscolbyl (25)in md5 • 6 years agoMD5 Collision Vulnerability: Generating Identical Hash Values From Two Different Computer ProgramsBelow is a paper I did for my graduate cryptography course. This was the first cryptography-related class I took, and was the first math paper I've written. No new discoveries were made, rather it…