Results 201 to 210 of about 12,847 (250)
Some of the next articles are maybe not open access.

Multiple Hashing Using SHA-256 and MD5

, 2021
Message Digest 5 (MD5) is a hashing function with numerous vulnerabilities such as pre-image vulnerability and collision vulnerability which restrict the usage of MD5. Therefore, by using other hashing functions such as SHA prior to hashing with MD5, we can use MD5 for various applications such as data integrity without compromising the security of the
G. P. Reddy   +4 more
semanticscholar   +3 more sources

A Journey from MD5 to SHA-3

, 2020
If X is sender of a message and Y is the receiver of the same, then X encrypts the same with Y’s public key and then sends the encrypted data to Y. It confirms about authenticity and authorization of receiver. If X sends message and Y receives, X encrypts the message with X’s private key and sends the encrypted data to Y.
Sandip Ghoshal   +3 more
semanticscholar   +3 more sources

MD5 Secured Cryptographic Hash Value

Proceedings of the 2018 International Conference on Machine Learning and Machine Intelligence, 2018
Over the past two decades, significant researches have been done in analyzing the MD5 algorithm to address its collision problem. This paper enhanced the original MD5 by adding four logical operations to increase the security of the message to become ...
Larry B. de Guzman   +2 more
semanticscholar   +3 more sources

Designing and validating an MD5 Hash Algorithm using the UVM Verification Framework and Checkers

International Conference on Computing Communication and Networking Technologies, 2023
The MD5 algorithm is widely employed for generating fixed-size hash values to ensure data integrity. By incorporating MD5 into the UVM verification framework, designers can efficiently verify the algorithm's functionality within digital designs.
K. K   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy