Results 91 to 100 of about 167,764 (227)

Evaluation of the proximate composition, functional, and pasting properties of ichipipi maize flour

open access: yesApplied Food Research
Ichipipi food is a traditional meal in Tanzania's southern highlands. In this study, ichipipi composite flour (MD) was produced using maize harvested at two different stages: milk (M) and dough (D) mixed at various ratios. Then, the proximate composition,
Princess Mpili   +2 more
doaj   +1 more source

A novel adaptive weight bi-directional long short-term memory (AWBi-LSTM) classifier model for heart stroke risk level prediction in IoT [PDF]

open access: yesPeerJ Computer Science
Stroke prediction has become one of the significant research areas due to the increasing fatality rate. Hence, this article proposes a novel Adaptive Weight Bi-Directional Long Short-Term Memory (AWBi-LSTM) classifier model for stroke risk level ...
S Thumilvannan, R Balamanigandan
doaj   +2 more sources

MD5.txt

open access: gold, 2021
Lan Jiang
openalex   +2 more sources

Chosen-Prefix Collisions on AES-like Hashing

open access: yesIACR Transactions on Symmetric Cryptology
Chosen-prefix collision (CPC) attack was first presented by Stevens, Lenstra and de Weger on MD5 at Eurocrypt 2007. A CPC attack finds a collision for any two chosen prefixes, which is a stronger variant of collision attack. CPCs are naturally harder to
Shiyao Chen   +3 more
doaj   +1 more source

SIMULASI KUNCI ELEKTRONIK DENGAN ENKRIPSI MELALUI BLUETOOTH PADA PONSEL

open access: yesCommIT Journal, 2008
Currently the facility provided by mobile phones is very diverse. Starting from the phone, SMS, camera, music player, all rolled into one. Obviously the phone can also be used as electronic keys to replace the existing analog key at this time.
Indri Neforawati, Hoga Saragih
doaj   +1 more source

Finding Hash Collisions Efficiently in MD5

open access: yes, 2023
This presentation includes: An explanation of message digest algorithms and how to quantify their security strength How MD5 works from a mathematical standpoint A brief history of the cryptanalysis of MD5 and the attacks which caused its breakage An overivew of chosen-prefix collision attacks on MD5 Examples of collision attacks that were used to ...
openaire   +1 more source

Security Login System on Mobile Application with Implementation of Advanced Encryption Standard (AES) using 3 Keys Variation 128-bit, 192-bit, and 256-bit

open access: yesScientific Journal of Informatics, 2019
The development of mobile applications is unbalanced with the level of its security which is vulnerable to hacker attacks. Some important things that need to be considered in the security of mobile applications are login and database system.
Hamdan Dian Jaya Rozi Hyang Utami   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy