Design and analysis of algorithms used in cryptographic protocols or security assessments. We carried out a sanity check of public key material on the web. Some of the findings were discussed here. Three of our record calculations are linked to under slashdot. The latest is a 73-digit factor found using the elliptic curve method. Chosen-prefix Collisions for MD5 and Applications describes the cons