Results 91 to 100 of about 164,602 (198)
Research on the multi-message modification techniques on MD5
According to research on the message modification techniques presented by Wang Xiaoyun et al and the advanced message modification techniques proposed by Yu Sasaki et al, the multi-message modification techniques were founded to not be always able to ...
CHEN Shi-wei, JIN Chen-hui
doaj +2 more sources
Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate
Marc Stevens+6 more
openalex +1 more source
El presente artículo aborda de manera general algunas de las funciones resúmenes (hash) más empleadas en criptografía tales como MD5, SHA-1, RIPEMD y HAVAL, así como los algoritmos básicos de funcionamiento de cada una de ellas, su aplicación o uso y sus
Lic. Sandra Blain Escalona+1 more
doaj
High-fidelity long-read sequencing of an avian herpesvirus reveals extensive intrapopulation diversity in tandem repeat regions. [PDF]
Ortigas-Vasquez A+8 more
europepmc +2 more sources
ПРОЯВЛЕНИЕ ПАТОГЕННЫХ СВОЙСТВ ШТАММА MD5 ВИРУСА БОЛЕЗНИ МАРЕКА У ЦЫПЛЯТ
Pathogenic characteristics of MD5 strain of Marek's disease virus were studied using the direct inoculation of SPF chicks of different age. The inoculation of one-day-old chicks caused 80% mortality, and 14-day-old chicks - 50%. The course of disease was
doaj
Multi-stage Pipelining MD5 Implementations on FPGA with Data Forwarding
Hoang Anh Tuan+2 more
openalex +2 more sources