Results 121 to 130 of about 12,815 (252)

Extracting a Salt from an MD5 Hash

open access: yes, 2013
This document shows how a salt was extracted from MD5-hashed paswords, based off the Anonymous leak of 800+K records from think-tank Stratfor.
openaire   +2 more sources

November 11, 2024, T1DX‐QI Learning Session, Journal of Diabetes Abstracts

open access: yes
Journal of Diabetes, Volume 16, Issue S1, December 2024.
wiley   +1 more source

Research on the multi-message modification techniques on MD5

open access: yesTongxin xuebao, 2009
According to research on the message modification techniques presented by Wang Xiaoyun et al and the advanced message modification techniques proposed by Yu Sasaki et al, the multi-message modification techniques were founded to not be always able to ...
CHEN Shi-wei, JIN Chen-hui
doaj   +2 more sources

Avalanche of MD5

open access: yesEnergy Procedia, 2011
Yi Liu, Fanbao Liu
openaire   +2 more sources

How to Break MD5 and Other Hash Functions

open access: yesInternational Conference on the Theory and Application of Cryptographic Techniques, 2005
Xiaoyun Wang, Hongbo Yu
semanticscholar   +1 more source

Funciones resúmenes o hash

open access: yesTelemática, 2012
El presente artículo aborda de manera general algunas de las funciones resúmenes (hash) más empleadas en criptografía tales como MD5, SHA-1, RIPEMD y HAVAL, así como los algoritmos básicos de funcionamiento de cada una de ellas, su aplicación o uso y sus
Lic. Sandra Blain Escalona   +1 more
doaj  

Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate

open access: bronze, 2009
Marc Stevens   +6 more
openalex   +1 more source

Home - About - Disclaimer - Privacy