Results 131 to 140 of about 164,602 (198)
Application of lentinan in suppression of Marek's disease virus infection. [PDF]
Gao Q+6 more
europepmc +1 more source
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners
Florian Mendel+2 more
openalex +1 more source
Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC
Lei Wang+4 more
openalex +2 more sources
Set of Necessary and Sufficient Conditions in Collision Attacks on MD5
Shi-Wei Chen, Chen-Hui Jin
openaire +2 more sources
Performance Analysis Cryptography Using AES-128 and Key Encryption Based on MD5
Reza Arista Pratama+5 more
openalex +1 more source
Rational <i>In Silico</i> Design of Selective TMPRSS6 Peptidomimetic Inhibitors via Exploitation of the S2 Subpocket. [PDF]
Desgagné M+12 more
europepmc +1 more source
Dynamic Mobile Token for Web Security using MD5 and One Time Password Method
I GedeN.AgungJayarana+2 more
openalex +1 more source
An antibiotic that mediates immune destruction of senescent cancer cells. [PDF]
Casagrande Raffi G+17 more
europepmc +1 more source