Results 201 to 210 of about 169,700 (231)
Some of the next articles are maybe not open access.

MD5 Research

2010 Second International Conference on Multimedia and Information Technology, 2010
This paper describes the MD5 algorithm. It analyses the theories from program codes and sums up some current crack approaches of this algorithm. According to these crack ways, the paper brings forward the corresponding measures for improvement and adopts procedures to achieve a project to prove its ...
Zhao Yong-Xia, Zhen Ge
openaire   +1 more source

MD5( ) Bypassing Through SQL Injection

Kristu Jayanti Journal of Computational Sciences (KJCS), 2021
Web-based application attacks are growing dramatically in number and severity. They found that web applications that are poorly validated and verified are susceptible to attacks by the attacker. network related SQL attacks. The MD5 (message digest algorithm) hashing method is a one-way cryptographic function that accepts any text field as input and ...
Rakesh P. V., Selwyn Paul J.
openaire   +1 more source

MD5-Based Error Detection

2009 Pacific-Asia Conference on Circuits, Communications and Systems, 2009
This paper proposes one kind of MD5-based error-detecting mechanism. The 128-bit MD5 code is compressed into 16-bit error-detecting code in order to substitute for that computed with CRC or checksum. In this mechanism, computer-simulating technology is used to simulate natural and manual attacks.
Hu Ming, Wang Yan
openaire   +1 more source

Home - About - Disclaimer - Privacy