Results 121 to 130 of about 160,083 (235)

Encoding Cryptographic Functions to SAT Using Transalg System [PDF]

open access: yesarXiv, 2016
In this paper we propose the technology for constructing propositional encodings of discrete functions. It is aimed at solving inversion problems of considered functions using state-of-the-art SAT solvers. We implemented this technology in the form of the software system called Transalg, and used it to construct SAT encodings for a number of ...
arxiv  

Design and evaluation of chaotic iterations based keyed hash function [PDF]

open access: yesarXiv, 2017
Investigating how to construct a secure hash algorithm needs in-depth study, as various existing hash functions like the MD5 algorithm have recently exposed their security flaws. At the same time, hash function based on chaotic theory has become an emerging research in the field of nonlinear information security.
arxiv  

Deep Learning Based Cryptographic Primitive Classification [PDF]

open access: yesarXiv, 2017
Cryptovirological augmentations present an immediate, incomparable threat. Over the last decade, the substantial proliferation of crypto-ransomware has had widespread consequences for consumers and organisations alike. Established preventive measures perform well, however, the problem has not ceased.
arxiv  

Learning tool for IPSEC with emphasis on the use of MGRE in corporate networks

open access: yesRevista UIS Ingenierías, 2013
This paper presents a tool named “UV IPsec Tools”, developed to understand and interact in a didactic way with the transformations performed by IPsec when using the MD5, SHA-1 and 3DES algorithms for the encryption and integrity check of an IPv4 datagram.
Andrés Mauricio Ramírez   +2 more
doaj  

Using fuzzy bits and neural networks to partially invert few rounds of some cryptographic hash functions [PDF]

open access: yesarXiv, 2019
We consider fuzzy, or continuous, bits, which take values in [0;1] and (-1;1] instead of {0;1}, and operations on them (NOT, XOR etc.) and on their sequences (ADD), to obtain the generalization of cryptographic hash functions, CHFs, for the messages consisting of fuzzy bits, so that CHFs become smooth and non-constant functions of each bit of the ...
arxiv  

Extracting a Salt from an MD5 Hash

open access: yes, 2013
This document shows how a salt was extracted from MD5-hashed paswords, based off the Anonymous leak of 800+K records from think-tank Stratfor.
openaire   +2 more sources

Automated family-based naming of small RNAs for next generation sequencing data using a modified MD5-digest algorithm [PDF]

open access: yesarXiv, 2012
We developed NameMyGene, a web tool and a stand alone program to easily generate putative family-based names for small RNA sequences so that laboratories can easily organize, analyze, and observe patterns from, the massive amount of data generated by next-generation sequencers.
arxiv  

Research on the multi-message modification techniques on MD5

open access: yesTongxin xuebao, 2009
According to research on the message modification techniques presented by Wang Xiaoyun et al and the advanced message modification techniques proposed by Yu Sasaki et al, the multi-message modification techniques were founded to not be always able to ...
CHEN Shi-wei, JIN Chen-hui
doaj   +2 more sources

Avalanche of MD5

open access: yesEnergy Procedia, 2011
Yi Liu, Fanbao Liu
openaire   +2 more sources

Home - About - Disclaimer - Privacy