Results 241 to 250 of about 12,847 (250)
Some of the next articles are maybe not open access.
2019 International Conference on Cyber Security and Internet of Things (ICSIoT), 2019
Identifying the right source and target nodes in IoT as well as secure data communication is very vital in ensuring security, validity and reliability of IoT communication.
Kester Quist-Aphetsi+1 more
semanticscholar +1 more source
Identifying the right source and target nodes in IoT as well as secure data communication is very vital in ensuring security, validity and reliability of IoT communication.
Kester Quist-Aphetsi+1 more
semanticscholar +1 more source
MD5 collisions and the impact on computer forensics
Digital Investigation, 2005In August 2004 at the annual cryptography conference in Santa Barbara, California a group of cryptographers, Xianyan Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu, made the announcement that they had successfully generated two files with different contents that had the same MD5 hash.
openaire +2 more sources
Digital image signature using triple protection cryptosystem (RSA, Vigenere, and MD5)
2017 International Conference on Smart Cities, Automation & Intelligent Computing Systems (ICON-SONICS), 2017Authentication of digital media has been done with the various scheme, one of them is a digital signature. The main reason the technique of digital signature appears on the concerns of people when sending important documents and raises the thought that ...
Oktaviana Rena Indriani+4 more
semanticscholar +1 more source
An Improved Collision Attack on MD5 Algorithm
2008The research on the attack algorithm for a MD5 collision is one of the focuses in cryptology nowadays. In this paper, by analyzing the properties of the nonlinear Boolean functions used in MD5 and the differences in term of XOR and subtraction modulo 232, we prove that some sufficient conditions presented by Jie Liang and Xuejia Lai are also necessary ...
Chenhui Jin, Shiwei Chen
openaire +2 more sources
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2015
Gaoli Wang, Yu Sasaki, Lei Wang
openaire +2 more sources
Gaoli Wang, Yu Sasaki, Lei Wang
openaire +2 more sources
Implementing First Round of MD5 in FPGA
Telecommunications and Radio Engineering, 2001Gonzalo Isaac Duchen Sánchez+2 more
openaire +2 more sources
Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules
Multimedia tools and applications, 2018Aqeel ur Rehman+4 more
semanticscholar +1 more source
Research on Security of MD5 Algorithm Application
Computer Science and Technology, 2016openaire +2 more sources
Exploration of key points for attack of MD5 algorithm
Journal of Computer Applications, 2010Shao-hui Chen, Ming Mao, Zhi-guang Qin
openaire +2 more sources