Results 191 to 198 of about 164,602 (198)
Some of the next articles are maybe not open access.
Implementation of MD5 Collision Attack in Program
2019Md5 [1] has been widely used because of its irreversibility, but its security is also questionable. Since Professor Wang [2] pointed out that MD5 is unsafe, Md5 collision and various attack algorithms began to appear and were used in large quantities. In the paper of Bai Honghuan’s MD5 fast collision algorithm [3], the characteristics of MD5 collision ...
Le Wang+4 more
openaire +2 more sources
Improvement and security analysis on MD5
Journal of Computer Applications, 2009Yi-xian Yang+2 more
openaire +2 more sources
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2015
Gaoli Wang, Yu Sasaki, Lei Wang
openaire +2 more sources
Gaoli Wang, Yu Sasaki, Lei Wang
openaire +2 more sources
Implementing First Round of MD5 in FPGA
Telecommunications and Radio Engineering, 2001Gonzalo Isaac Duchen Sánchez+2 more
openaire +2 more sources
Exploration of key points for attack of MD5 algorithm
Journal of Computer Applications, 2010Shao-hui Chen, Ming Mao, Zhi-guang Qin
openaire +2 more sources
High Throughput Implementation of MD5 Algorithm on GPU
Proceedings of the 4th International Conference on Ubiquitous Information Technologies & Applications, 2009Guang Hu, Jianhua Ma, Benxiong Huang
openaire +2 more sources
Research on Security of MD5 Algorithm Application
Computer Science and Technology, 2016openaire +2 more sources