Results 191 to 200 of about 6,621 (206)
Some of the next articles are maybe not open access.

On combining MD5 for image authentication using LSB substitution in selected pixels

2018 International Conference on Engineering and Emerging Technologies (ICEET), 2018
This paper presents an image authentication technique using message digest five (MD5) as digital signature. The signature is used as a watermark to authenticate the data integrity.
M. Wahid   +3 more
semanticscholar   +1 more source

Preimage Attacks on Step-Reduced MD5

2008
In this paper, we propose preimage attacks on step-reduced MD5. We show that a preimage of a 44-step MD5 can be computed to a complexity of 296. We also consider a preimage attack against variants of MD5 where the round order is modified from the real MD5.
Yu Sasaki, Kazumaro Aoki
openaire   +2 more sources

DeyPos: For multi-users environments using MD5

2017 1st International Conference on Intelligent Systems and Information Management (ICISIM), 2017
Dynamic Proof of Storage (PoS) is a conducive cryptographic rudimentary technology that empowers a client to cohere the respectability of outsourced and in addition insourced records and to proficiently refresh the documents in a server. A multi-client needs the protected customer side cross-client replica method, enabling a client to avoid the ...
Manisha Bharati   +2 more
openaire   +2 more sources

Construction of the Initial Structure for Preimage Attack of MD5

2009 International Conference on Computational Intelligence and Security, 2009
The construction of the initial structure for preimage attack of MD5 is proposed in this paper. With the help of “divide-and-rule” technique, the successful possibility of the construction is higher than 2-32 . Our construction is based on the MD5 structure, the message modification technique which is improved from Wang’ s. Some related techniques such
Jin Xu, Ming Mao, Shaohui Chen
openaire   +2 more sources

Sybil attack detection and secure data transmission in VANET using CMEHA-DNN and MD5-ECC

Journal of Ambient Intelligence and Humanized Computing, 2021
Nitha C. Velayudhan   +2 more
semanticscholar   +1 more source

Studies of Quadratic Watermark Based on MD5

2013
In the area of digital watermark’s copyright protection, it is difficult to identify the rightful ownership in multiple marks, namely the interpretation attack. In this paper, we propound the quadratic watermark based on the message-digest algorithm 5 (MD5). By embedding a watermark and the MD5 into the products in proper order, the products can resist
Shibo Qiu, Lei Liu, Taolin Ma
openaire   +2 more sources

TG43 - The MD5 Checksum for an MSL Report

2023
MSL can provide electronic calibration, test, and measurement reports in Portable Document Format (PDF) as an alternative to paper documents. When a report is emailed to a customer, MSL also provides an MD5 checksum for the file. A new checksum should be calculated on arrival and compared to the one provided by MSL.
openaire   +1 more source

Implementation of MD5 Collision Attack in Program

2019
Md5 [1] has been widely used because of its irreversibility, but its security is also questionable. Since Professor Wang [2] pointed out that MD5 is unsafe, Md5 collision and various attack algorithms began to appear and were used in large quantities. In the paper of Bai Honghuan’s MD5 fast collision algorithm [3], the characteristics of MD5 collision ...
Le Wang   +4 more
openaire   +2 more sources

Securing the Storage of Passwords Based on the MD5 HASH Transformation

Digital Technologies and Applications, 2021
Hamza Touil, N. E. Akkad, K. Satori
semanticscholar   +1 more source

Improvement and security analysis on MD5

Journal of Computer Applications, 2009
Yi-xian Yang   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy