Results 191 to 200 of about 6,621 (206)
Some of the next articles are maybe not open access.
On combining MD5 for image authentication using LSB substitution in selected pixels
2018 International Conference on Engineering and Emerging Technologies (ICEET), 2018This paper presents an image authentication technique using message digest five (MD5) as digital signature. The signature is used as a watermark to authenticate the data integrity.
M. Wahid+3 more
semanticscholar +1 more source
Preimage Attacks on Step-Reduced MD5
2008In this paper, we propose preimage attacks on step-reduced MD5. We show that a preimage of a 44-step MD5 can be computed to a complexity of 296. We also consider a preimage attack against variants of MD5 where the round order is modified from the real MD5.
Yu Sasaki, Kazumaro Aoki
openaire +2 more sources
DeyPos: For multi-users environments using MD5
2017 1st International Conference on Intelligent Systems and Information Management (ICISIM), 2017Dynamic Proof of Storage (PoS) is a conducive cryptographic rudimentary technology that empowers a client to cohere the respectability of outsourced and in addition insourced records and to proficiently refresh the documents in a server. A multi-client needs the protected customer side cross-client replica method, enabling a client to avoid the ...
Manisha Bharati+2 more
openaire +2 more sources
Construction of the Initial Structure for Preimage Attack of MD5
2009 International Conference on Computational Intelligence and Security, 2009The construction of the initial structure for preimage attack of MD5 is proposed in this paper. With the help of “divide-and-rule” technique, the successful possibility of the construction is higher than 2-32 . Our construction is based on the MD5 structure, the message modification technique which is improved from Wang’ s. Some related techniques such
Jin Xu, Ming Mao, Shaohui Chen
openaire +2 more sources
Sybil attack detection and secure data transmission in VANET using CMEHA-DNN and MD5-ECC
Journal of Ambient Intelligence and Humanized Computing, 2021Nitha C. Velayudhan+2 more
semanticscholar +1 more source
Studies of Quadratic Watermark Based on MD5
2013In the area of digital watermark’s copyright protection, it is difficult to identify the rightful ownership in multiple marks, namely the interpretation attack. In this paper, we propound the quadratic watermark based on the message-digest algorithm 5 (MD5). By embedding a watermark and the MD5 into the products in proper order, the products can resist
Shibo Qiu, Lei Liu, Taolin Ma
openaire +2 more sources
TG43 - The MD5 Checksum for an MSL Report
2023MSL can provide electronic calibration, test, and measurement reports in Portable Document Format (PDF) as an alternative to paper documents. When a report is emailed to a customer, MSL also provides an MD5 checksum for the file. A new checksum should be calculated on arrival and compared to the one provided by MSL.
openaire +1 more source
Implementation of MD5 Collision Attack in Program
2019Md5 [1] has been widely used because of its irreversibility, but its security is also questionable. Since Professor Wang [2] pointed out that MD5 is unsafe, Md5 collision and various attack algorithms began to appear and were used in large quantities. In the paper of Bai Honghuan’s MD5 fast collision algorithm [3], the characteristics of MD5 collision ...
Le Wang+4 more
openaire +2 more sources
Securing the Storage of Passwords Based on the MD5 HASH Transformation
Digital Technologies and Applications, 2021Hamza Touil, N. E. Akkad, K. Satori
semanticscholar +1 more source
Improvement and security analysis on MD5
Journal of Computer Applications, 2009Yi-xian Yang+2 more
openaire +2 more sources