Results 241 to 250 of about 12,847 (250)
Some of the next articles are maybe not open access.

Node to Node Secure Data Communication for IoT Devices Using Diffie-Hellman, AES, and MD5 Cryptographic Schemes

2019 International Conference on Cyber Security and Internet of Things (ICSIoT), 2019
Identifying the right source and target nodes in IoT as well as secure data communication is very vital in ensuring security, validity and reliability of IoT communication.
Kester Quist-Aphetsi   +1 more
semanticscholar   +1 more source

MD5 collisions and the impact on computer forensics

Digital Investigation, 2005
In August 2004 at the annual cryptography conference in Santa Barbara, California a group of cryptographers, Xianyan Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu, made the announcement that they had successfully generated two files with different contents that had the same MD5 hash.
openaire   +2 more sources

Digital image signature using triple protection cryptosystem (RSA, Vigenere, and MD5)

2017 International Conference on Smart Cities, Automation & Intelligent Computing Systems (ICON-SONICS), 2017
Authentication of digital media has been done with the various scheme, one of them is a digital signature. The main reason the technique of digital signature appears on the concerns of people when sending important documents and raises the thought that ...
Oktaviana Rena Indriani   +4 more
semanticscholar   +1 more source

An Improved Collision Attack on MD5 Algorithm

2008
The research on the attack algorithm for a MD5 collision is one of the focuses in cryptology nowadays. In this paper, by analyzing the properties of the nonlinear Boolean functions used in MD5 and the differences in term of XOR and subtraction modulo 232, we prove that some sufficient conditions presented by Jie Liang and Xuejia Lai are also necessary ...
Chenhui Jin, Shiwei Chen
openaire   +2 more sources

Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2015
Gaoli Wang, Yu Sasaki, Lei Wang
openaire   +2 more sources

Implementing First Round of MD5 in FPGA

Telecommunications and Radio Engineering, 2001
Gonzalo Isaac Duchen Sánchez   +2 more
openaire   +2 more sources

Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules

Multimedia tools and applications, 2018
Aqeel ur Rehman   +4 more
semanticscholar   +1 more source

MD5

2005
openaire   +1 more source

Exploration of key points for attack of MD5 algorithm

Journal of Computer Applications, 2010
Shao-hui Chen, Ming Mao, Zhi-guang Qin
openaire   +2 more sources

Home - About - Disclaimer - Privacy