Results 101 to 110 of about 160,083 (235)

Unveiling microbial communities with EasyAmplicon: A user‐centric guide to perform amplicon sequencing data analysis

open access: yesiMetaOmics, Volume 1, Issue 2, December 2024.
The EasyAmplicon pipeline workflow for amplicon sequencing analysis begins with sample collection and next‐generation sequencing, which generates sequencing data alongside crucial metadata for contextual understanding. This user‐friendly pipeline is compatible with Windows, Linux, and macOS, offering both command‐line and interactive modes in RStudio ...
Salsabeel Yousuf   +38 more
wiley   +1 more source

General Graph Identification By Hashing [PDF]

open access: yesarXiv, 2015
A method for identifying graphs using MD5 hashing is presented. This allows fast graph equality comparisons and can also be used to facilitate graph isomorphism testing. The graphs can be labeled or unlabeled. The method identifies vertices by hashing the graph configuration in their neighborhoods.
arxiv  

Finding Hash Collisions Efficiently in MD5

open access: yes, 2023
This presentation includes: An explanation of message digest algorithms and how to quantify their security strength How MD5 works from a mathematical standpoint A brief history of the cryptanalysis of MD5 and the attacks which caused its breakage An overivew of chosen-prefix collision attacks on MD5 Examples of collision attacks that were used to ...
openaire   +1 more source

Performance analysis of a security architecture for active networks in Java [PDF]

open access: yes, 2003
Internacional Association of Science and Technology for Development - IASTED, Benalmadena, Spain: 8-10 Septiembre, 2003.Active network technology supports the deployment and execution on the fly of new active services, without interrupting the network ...
Alarcos, Bernardo   +3 more
core   +2 more sources

BLAKE2: Simpler, Smaller, Fast as MD5 [PDF]

open access: yes, 2013
We present the hash function BLAKE2, an improved version of the SHA-3 finalist BLAKE optimized for speed in software. Target applications include cloud storage, intrusion detection, or version control systems. BLAKE2 comes in two main flavors: BLAKE2b is optimized for 64-bit platforms, and BLAKE2s for smaller architectures.
Zooko Wilcox-O'Hearn   +3 more
openaire   +2 more sources

Quantum Gauge Transformations and Braided Structure on Quantum Principal Bundles [PDF]

open access: yesarXiv, 1996
It is shown that every quantum principal bundle is braided, in the sense that there exists an intrinsic braid operator twisting the functions on the bundle. A detailed algebraic analysis of this operator is performed. In particular, it turns out that the braiding admits a natural extension to the level of arbitrary differential forms on the bundle ...
arxiv  

A Formula That Generates Hash Collisions

open access: yes, 2018
We present an explicit formula that produces hash collisions for the Merkle-Damg{\aa}rd construction. The formula works for arbitrary choice of message block and irrespective of the standardized constants used in hash functions, although some padding ...
Brockmann, Andrew
core  

On the Security of Encryption Modes of MD4, MD5 and HAVAL [PDF]

open access: yes, 2005
In this paper, we cryptanalyze the compression functions of MD4, MD5 and 4-, 5-pass HAVAL in encryption mode. We exploit the recently proposed related-key rectangle and boomerang techniques to show non-randomness of MD4, MD5 and 4-, 5-pass HAVAL and to distinguish them from a randomly chosen cipher.
Kim, J.   +3 more
openaire   +3 more sources

Authentication via wireless networks [PDF]

open access: yesMIPRO, 2006, 2007
Personal authentication is an important process we encounter almost every day; when we are logging on a computer, entering a company where we work, or a restricted area, when we are using our plastic credit cards to pay for a service or to complete some other financial transaction, etc. In each of these processes of personal authentication some kind of
arxiv  

A Secure Hash Function MD-192 With Modified Message Expansion [PDF]

open access: yesarXiv, 2010
Cryptographic hash functions play a central role in cryptography. Hash functions were introduced in cryptology to provide message integrity and authentication. MD5, SHA1 and RIPEMD are among the most commonly used message digest algorithm. Recently proposed attacks on well known and widely used hash functions motivate a design of new stronger hash ...
arxiv  

Home - About - Disclaimer - Privacy