Results 11 to 20 of about 169,700 (231)

Криптоанализ MD5 [PDF]

open access: yesВестник Национального технического университета Харьковский политехнический институт. Серия: Информатика и моделирование, 2005
В статті розглядаються сучасні методи кріптоаналізу хеш-функції MD5 з метою розкриття паролю та підробки цифрового підпису документу. Зроблені висновки відповідно до перспектив кріптоаналізу на сучасному технічному рівні та наведені рекомендації до подальшого використання MD5 з урахуванням знайдених вразливостей.
Гугнин, Владимир Николаевич   +1 more
core   +5 more sources

DIGITAL SIGNATURE PADA CITRA MENGGUNAKAN RSA DAN VIGENERE CIPHER BERBASIS MD5

open access: diamondSimetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer, 2019
Salah satu teknik yang populer untuk mengamankan data dengan tingkat keamanan yang tinggi yaitu kriptografi. Berbagai penelitian telah dilakukan dengan menggabungkan kunci simteris dan kunci asimteris untuk mendapatkan keamanan ganda.
Lekso Budi Handoko   +3 more
doaj   +3 more sources

Avalanche of MD5

open access: diamondEnergy Procedia, 2011
Fanbao Liu, Yi Liu
openaire   +2 more sources

Desain Aplikasi Algoritma MD5 (Message Digest 5) Pada Media SMS Berbasis Android Mobile

open access: yesDigital Zone: Jurnal Teknologi Informasi dan Komunikasi, 2017
Abstrak- Tulisan ini membahas tentang disain Aplikasi Algoritma MD5. Dalam desain ini dibuat model kirim dan terima SMS aman. Dari model ini bisa dibuat desain aplikasi berbasis objek menggunakan Unified Modeling Language (UML), State Machine untuk ...
Zaiful Bahri   +2 more
doaj   +3 more sources

archivist: An R Package for Managing, Recording and Restoring Data Analysis Results [PDF]

open access: yes, 2017
Everything that exists in R is an object [Chambers2016]. This article examines what would be possible if we kept copies of all R objects that have ever been created.
Biecek, Przemyslaw, Kosinski, Marcin
core   +3 more sources

SHA-1 and MD5 Cryptographic Hash Functions: Security Overview

open access: yesCommunications, 2015
Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers.
Roman Jasek
doaj   +1 more source

Criptografía y seguridad en M-COMMERCE

open access: yesRevista Científica Ciencia y Tecnología, 2017
El presente trabajo analiza los parámetros de seguridad más utilizados en el comercio electrónico realizado a través de dispositivos móviles (m-commerce), dentro de este se hace referencia a los tipos de cifrados que se usan con el fin de precautelar la ...
Cristhian Romero Romero   +2 more
doaj   +1 more source

Issuing Digital Signatures for Integrity and Authentication of Digital Documents

open access: yesAl-Mustansiriyah Journal of Science, 2023
In this paper, we developed a secure system for issuing digital signature for digital documents and certificates using message digest algorithm (MD5). The developed system is providing the integrity and authentication for certificates by combining the ...
Hassan Kassim Albahadily   +3 more
doaj   +1 more source

FPGA Design and Implementation of Data Covering Based on MD5 Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2016
The protection of information leads to protection of individual privacy for everyone. This protection is performed using encryption. Many types of encryption may be utilized while the simplest one is the covering of information.
Thamir R. Saeed
doaj   +1 more source

A High-Resolution Hubble Space Telescope Study of Apparent Lyman Continuum Leakers at $z\sim3$ [PDF]

open access: yes, 2015
We present $U_{336}V_{606}J_{125}H_{160}$ follow-up $HST$ observations of 16 $z\sim3$ candidate LyC emitters in the HS1549+1919 field. With these data, we obtain high spatial-resolution photometric redshifts of all sub-arcsecond components of the LyC ...
Mostardi, Robin E.   +5 more
core   +2 more sources

Home - About - Disclaimer - Privacy