Results 211 to 220 of about 166,374 (227)
Some of the next articles are maybe not open access.
MD5 collisions and the impact on computer forensics
Digital Investigation, 2005In August 2004 at the annual cryptography conference in Santa Barbara, California a group of cryptographers, Xianyan Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu, made the announcement that they had successfully generated two files with different contents that had the same MD5 hash.
openaire +1 more source
An Improved Collision Attack on MD5 Algorithm
2008The research on the attack algorithm for a MD5 collision is one of the focuses in cryptology nowadays. In this paper, by analyzing the properties of the nonlinear Boolean functions used in MD5 and the differences in term of XOR and subtraction modulo 232, we prove that some sufficient conditions presented by Jie Liang and Xuejia Lai are also necessary ...
Shiwei Chen, Chenhui Jin
openaire +1 more source
Studies of Quadratic Watermark Based on MD5
2013In the area of digital watermarkâs copyright protection, it is difficult to identify the rightful ownership in multiple marks, namely the interpretation attack. In this paper, we propound the quadratic watermark based on the message-digest algorithm 5 (MD5). By embedding a watermark and the MD5 into the products in proper order, the products can resist
Shibo Qiu, Taolin Ma, Lei Liu
openaire +1 more source
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2015
Yu SASAKI, Gaoli WANG, Lei WANG
openaire +1 more source
Yu SASAKI, Gaoli WANG, Lei WANG
openaire +1 more source
Improvement and security analysis on MD5
Journal of Computer Applications, 2009SHao-lan ZHANG +2 more
openaire +1 more source

