Results 231 to 240 of about 12,847 (250)
Some of the next articles are maybe not open access.
Collisions of MMO-MD5 and Their Impact on Original MD5
2011In this paper, we find collisions of MD5 in the Matyas-Meyer-Oseas mode and Miyaguchi-Preneel mode with a complexity of 239 operations, which runs contrary to the cryptographer's belief that these modes are stronger against collision attacks than the Davies-Meyer mode due to the impossibility of the message modification.
openaire +2 more sources
Design and Implementation of OTP Base on MD5
Applied Mechanics and Materials, 2014Encryption of information is getting increasingly large attention, due to the popularity of internet and the advance of technology. One of the encryption algorithms, MD5, is commonly used in data encryption nowadays. In this paper, MD5 algorithm was briefly described and used to construct a dynamic password encryption technique with time parameters ...
Qi You Xie+4 more
openaire +2 more sources
2019 International Conference on Cyber Security and Internet of Things (ICSIoT), 2019
To maintain and ensure that the quality of water produced from the water treatment plant and the same quality is delivered to customers, there is the need to create a mechanism called the Data Logging System, where data will be collected from strategic ...
Kester Quist-Aphetsi, Henry Blankson
semanticscholar +1 more source
To maintain and ensure that the quality of water produced from the water treatment plant and the same quality is delivered to customers, there is the need to create a mechanism called the Data Logging System, where data will be collected from strategic ...
Kester Quist-Aphetsi, Henry Blankson
semanticscholar +1 more source
IMPLEMENTASI METODE MD5 UNTUK MENDETEKSI ORISINALITAS FILE AUDIO
, 2019The problem of the originality of the file is about how the file can be maintained its authenticity and ensures that the file has never been changed at all. In this study the object file used is the audio file.
S. Lubis
semanticscholar +1 more source
A novel technique of cloud security based on hybrid encryption by Blowfish and MD5
2017 4th International Conference on Signal Processing, Computing and Control (ISPCC), 2017The networks have moved worldwide and information has been considered in the digital form of bits and bytes. Critical information is stored, refined and sent in digital form on personal computers.
Adviti Chauhan, Jyoti Gupta
semanticscholar +1 more source
2008 International Conference on Advanced Computer Theory and Engineering, 2008
A new image retrieval method was introduced based on the combination of CBIR (content-based image retrieval) and MD5, after a brief introduction to current status of image retrieval technology. Kernel thought was that MD5 value was extracted from an image file and then indexed. These indexed MD5 values were used for image retrieval.
openaire +2 more sources
A new image retrieval method was introduced based on the combination of CBIR (content-based image retrieval) and MD5, after a brief introduction to current status of image retrieval technology. Kernel thought was that MD5 value was extracted from an image file and then indexed. These indexed MD5 values were used for image retrieval.
openaire +2 more sources
Increasing the security of mp3 steganography using AES Encryption and MD5 hash function
International Conference on Information Control Systems & Technologies, 2016In the internet age, the security of data exchange becomes risky from some tapping attacks. One of the ways to maintain the data's security is by using steganography techniques.
Rini Indrayani+3 more
semanticscholar +1 more source
Secured IoT Through Hashing Using MD5
International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics, 2018With the boom of Internet of Things, the embedded devices are being able to connect to the internet and intercommunicate with each other. Internets of Things find many applications in various fields but the emergence of IoT have put the embedded device ...
I. Landge, Hannan Satopay
semanticscholar +1 more source
MD5 Encryption Algorithm Enhanced Competitive Swarm Optimizer for Feature Selection
2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), 2019Feature selection plays a crucial role in machine learning. For evolutionary computation based feature selection, the same particles may be repeatedly generated many times during the population iteration process, and recalculating the fitness values of ...
Yanhong Lin+5 more
semanticscholar +1 more source