Design and analysis of algorithms used in cryptographic protocols or security assessments. We carried out a sanity check of public key material on the web. Some of the findings were discussed here. Three of our record calculations are linked to under slashdot. The latest is a 73-digit factor found using the elliptic curve method. Chosen-prefix Collisions for MD5 and Applications describes the cons
![LACAL](https://cdn-ak-scissors.b.st-hatena.com/image/square/b3e1593dc4b3fd0ce4ba77f16b3078f3fa945728/height=288;version=1;width=512/https%3A%2F%2Factu.epfl.ch%2Fimage%2F92055%2F1108x622.jpg)