Results 211 to 220 of about 166,374 (227)
Some of the next articles are maybe not open access.

MD5 collisions and the impact on computer forensics

Digital Investigation, 2005
In August 2004 at the annual cryptography conference in Santa Barbara, California a group of cryptographers, Xianyan Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu, made the announcement that they had successfully generated two files with different contents that had the same MD5 hash.
openaire   +1 more source

An Improved Collision Attack on MD5 Algorithm

2008
The research on the attack algorithm for a MD5 collision is one of the focuses in cryptology nowadays. In this paper, by analyzing the properties of the nonlinear Boolean functions used in MD5 and the differences in term of XOR and subtraction modulo 232, we prove that some sufficient conditions presented by Jie Liang and Xuejia Lai are also necessary ...
Shiwei Chen, Chenhui Jin
openaire   +1 more source

Studies of Quadratic Watermark Based on MD5

2013
In the area of digital watermark’s copyright protection, it is difficult to identify the rightful ownership in multiple marks, namely the interpretation attack. In this paper, we propound the quadratic watermark based on the message-digest algorithm 5 (MD5). By embedding a watermark and the MD5 into the products in proper order, the products can resist
Shibo Qiu, Taolin Ma, Lei Liu
openaire   +1 more source

Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2015
Yu SASAKI, Gaoli WANG, Lei WANG
openaire   +1 more source

The death of MD5

Network Security, 2009
openaire   +1 more source

MD5

2005
openaire   +1 more source

Improvement and security analysis on MD5

Journal of Computer Applications, 2009
SHao-lan ZHANG   +2 more
openaire   +1 more source

Md4-Md5

2012
openaire   +1 more source

Home - About - Disclaimer - Privacy