Results 91 to 100 of about 166,374 (227)

Evaluation of the proximate composition, functional, and pasting properties of ichipipi maize flour

open access: yesApplied Food Research
Ichipipi food is a traditional meal in Tanzania's southern highlands. In this study, ichipipi composite flour (MD) was produced using maize harvested at two different stages: milk (M) and dough (D) mixed at various ratios. Then, the proximate composition,
Princess Mpili   +2 more
doaj   +1 more source

A Study of the MD5 Attacks: Insights and Improvements [PDF]

open access: yes, 2006
MD5 is a well-known and widely-used cryptographic hash function. It has received renewed attention from researchers subsequent to the recent announcement of collisions found by Wang et al. [16]. To date, however, the method used by researchers in this work has been fairly difficult to grasp.
John Black   +2 more
openaire   +1 more source

Chosen-Prefix Collisions on AES-like Hashing

open access: yesIACR Transactions on Symmetric Cryptology
Chosen-prefix collision (CPC) attack was first presented by Stevens, Lenstra and de Weger on MD5 at Eurocrypt 2007. A CPC attack finds a collision for any two chosen prefixes, which is a stronger variant of collision attack. CPCs are naturally harder to
Shiyao Chen   +3 more
doaj   +1 more source

SIMULASI KUNCI ELEKTRONIK DENGAN ENKRIPSI MELALUI BLUETOOTH PADA PONSEL

open access: yesCommIT Journal, 2008
Currently the facility provided by mobile phones is very diverse. Starting from the phone, SMS, camera, music player, all rolled into one. Obviously the phone can also be used as electronic keys to replace the existing analog key at this time.
Indri Neforawati, Hoga Saragih
doaj   +1 more source

Security Login System on Mobile Application with Implementation of Advanced Encryption Standard (AES) using 3 Keys Variation 128-bit, 192-bit, and 256-bit

open access: yesScientific Journal of Informatics, 2019
The development of mobile applications is unbalanced with the level of its security which is vulnerable to hacker attacks. Some important things that need to be considered in the security of mobile applications are login and database system.
Hamdan Dian Jaya Rozi Hyang Utami   +2 more
doaj   +1 more source

Preclinical screening of histone deacetylase inhibitors combined with ABT-737, rhTRAIL/MD5-1 or 5-azacytidine using syngeneic Vk*MYC multiple myeloma [PDF]

open access: gold, 2013
Geoffrey M. Matthews   +11 more
openalex   +1 more source

Finding Hash Collisions Efficiently in MD5

open access: yes, 2023
This presentation includes: An explanation of message digest algorithms and how to quantify their security strength How MD5 works from a mathematical standpoint A brief history of the cryptanalysis of MD5 and the attacks which caused its breakage An overivew of chosen-prefix collision attacks on MD5 Examples of collision attacks that were used to ...
openaire   +1 more source

Learning tool for IPSEC with emphasis on the use of MGRE in corporate networks

open access: yesRevista UIS Ingenierías, 2013
This paper presents a tool named “UV IPsec Tools”, developed to understand and interact in a didactic way with the transformations performed by IPsec when using the MD5, SHA-1 and 3DES algorithms for the encryption and integrity check of an IPv4 datagram.
Andrés Mauricio Ramírez   +2 more
doaj  

Home - About - Disclaimer - Privacy