Results 91 to 100 of about 164,602 (198)

Avalanche of MD5

open access: yesEnergy Procedia, 2011
Yi Liu, Fanbao Liu
openaire   +2 more sources

Research on the multi-message modification techniques on MD5

open access: yesTongxin xuebao, 2009
According to research on the message modification techniques presented by Wang Xiaoyun et al and the advanced message modification techniques proposed by Yu Sasaki et al, the multi-message modification techniques were founded to not be always able to ...
CHEN Shi-wei, JIN Chen-hui
doaj   +2 more sources

Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate

open access: bronze, 2009
Marc Stevens   +6 more
openalex   +1 more source

Funciones resúmenes o hash

open access: yesTelemática, 2012
El presente artículo aborda de manera general algunas de las funciones resúmenes (hash) más empleadas en criptografía tales como MD5, SHA-1, RIPEMD y HAVAL, así como los algoritmos básicos de funcionamiento de cada una de ellas, su aplicación o uso y sus
Lic. Sandra Blain Escalona   +1 more
doaj  

High-fidelity long-read sequencing of an avian herpesvirus reveals extensive intrapopulation diversity in tandem repeat regions. [PDF]

open access: yesPLoS Pathog
Ortigas-Vasquez A   +8 more
europepmc   +2 more sources

ПРОЯВЛЕНИЕ ПАТОГЕННЫХ СВОЙСТВ ШТАММА MD5 ВИРУСА БОЛЕЗНИ МАРЕКА У ЦЫПЛЯТ

open access: yesВетеринарная патология, 2010
Pathogenic characteristics of MD5 strain of Marek's disease virus were studied using the direct inoculation of SPF chicks of different age. The inoculation of one-day-old chicks caused 80% mortality, and 14-day-old chicks - 50%. The course of disease was

doaj  

Home - About - Disclaimer - Privacy