<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Wed, 15 Apr 2026 07:29:40 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@colbyl/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[MD5 Collision Vulnerability: Generating Identical Hash Values From Two Different Computer Programs]]></title><description><![CDATA[Below is a paper I did for my graduate cryptography course. This was the first cryptography-related class I took, and was the first math paper I've written. No new discoveries were made, rather it served]]></description><link>http://direct.ecency.com/md5/@colbyl/md5-collision-vulnerability-generating-identical-hash-values-from-two-different-computer-programs</link><guid isPermaLink="true">http://direct.ecency.com/md5/@colbyl/md5-collision-vulnerability-generating-identical-hash-values-from-two-different-computer-programs</guid><category><![CDATA[md5]]></category><dc:creator><![CDATA[colbyl]]></dc:creator><pubDate>Fri, 08 Feb 2019 19:28:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/HNWT6DgoBc14riaEeLCzGYopkqYBKxpGKqfNWfgr368M9Wqvqvjqn6kdyoUy3tVAmdk5L86t7myyoRfEGeeLGdDhGKDyerwWd4QpXLoLPS6jS8DuFoD568SLisg?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>