Results 201 to 210 of about 160,083 (235)

Hardware implementation of the MD5 algorithm.

open access: bronzeIFAC Proceedings Volumes, 2009
Abstract The paper presents a hardware implementation of the MD5 hash generator. The generator comprises MD5 processing unit, data exchange interface and memory block for storing input messages. A general concept and implementation of the MD5 generator modules is described.
Danuta Pamula, Adam Ziebinski
openaire   +3 more sources
Some of the next articles are maybe not open access.

Related searches:

MD5 Research

2010 Second International Conference on Multimedia and Information Technology, 2010
This paper describes the MD5 algorithm. It analyses the theories from program codes and sums up some current crack approaches of this algorithm. According to these crack ways, the paper brings forward the corresponding measures for improvement and adopts procedures to achieve a project to prove its ...
Zhen Ge, Zhao Yong-Xia
openaire   +2 more sources

MD5-Based Error Detection

2009 Pacific-Asia Conference on Circuits, Communications and Systems, 2009
This paper proposes one kind of MD5-based error-detecting mechanism. The 128-bit MD5 code is compressed into 16-bit error-detecting code in order to substitute for that computed with CRC or checksum. In this mechanism, computer-simulating technology is used to simulate natural and manual attacks.
Hu Ming, Wang Yan
openaire   +2 more sources

The death of MD5

Network Security, 2009
MD5 has been used widely so far. It is still heavily used in areas such as banking and even computer forensics. However, a recent security research paper seems to have reaffirmed fears that this algorithm is no longer suitable.
openaire   +2 more sources

Home - About - Disclaimer - Privacy