Results 191 to 198 of about 164,602 (198)
Some of the next articles are maybe not open access.

Implementation of MD5 Collision Attack in Program

2019
Md5 [1] has been widely used because of its irreversibility, but its security is also questionable. Since Professor Wang [2] pointed out that MD5 is unsafe, Md5 collision and various attack algorithms began to appear and were used in large quantities. In the paper of Bai Honghuan’s MD5 fast collision algorithm [3], the characteristics of MD5 collision ...
Le Wang   +4 more
openaire   +2 more sources

Improvement and security analysis on MD5

Journal of Computer Applications, 2009
Yi-xian Yang   +2 more
openaire   +2 more sources

Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2015
Gaoli Wang, Yu Sasaki, Lei Wang
openaire   +2 more sources

Implementing First Round of MD5 in FPGA

Telecommunications and Radio Engineering, 2001
Gonzalo Isaac Duchen Sánchez   +2 more
openaire   +2 more sources

MD5

2005
openaire   +1 more source

Exploration of key points for attack of MD5 algorithm

Journal of Computer Applications, 2010
Shao-hui Chen, Ming Mao, Zhi-guang Qin
openaire   +2 more sources

High Throughput Implementation of MD5 Algorithm on GPU

Proceedings of the 4th International Conference on Ubiquitous Information Technologies & Applications, 2009
Guang Hu, Jianhua Ma, Benxiong Huang
openaire   +2 more sources

Home - About - Disclaimer - Privacy