Results 21 to 30 of about 167,764 (227)

A High-Resolution Hubble Space Telescope Study of Apparent Lyman Continuum Leakers at $z\sim3$ [PDF]

open access: yes, 2015
We present $U_{336}V_{606}J_{125}H_{160}$ follow-up $HST$ observations of 16 $z\sim3$ candidate LyC emitters in the HS1549+1919 field. With these data, we obtain high spatial-resolution photometric redshifts of all sub-arcsecond components of the LyC ...
Mostardi, Robin E.   +5 more
core   +2 more sources

SHA-1 and MD5 Cryptographic Hash Functions: Security Overview

open access: yesCommunications, 2015
Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers.
Roman Jasek
doaj   +1 more source

Issuing Digital Signatures for Integrity and Authentication of Digital Documents

open access: yesAl-Mustansiriyah Journal of Science, 2023
In this paper, we developed a secure system for issuing digital signature for digital documents and certificates using message digest algorithm (MD5). The developed system is providing the integrity and authentication for certificates by combining the ...
Hassan Kassim Albahadily   +3 more
doaj   +1 more source

Criptografía y seguridad en M-COMMERCE

open access: yesRevista Científica Ciencia y Tecnología, 2017
El presente trabajo analiza los parámetros de seguridad más utilizados en el comercio electrónico realizado a través de dispositivos móviles (m-commerce), dentro de este se hace referencia a los tipos de cifrados que se usan con el fin de precautelar la ...
Cristhian Romero Romero   +2 more
doaj   +1 more source

FPGA Design and Implementation of Data Covering Based on MD5 Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2016
The protection of information leads to protection of individual privacy for everyone. This protection is performed using encryption. Many types of encryption may be utilized while the simplest one is the covering of information.
Thamir R. Saeed
doaj   +1 more source

Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC [PDF]

open access: yes, 2009
In this paper, we present the first distinguishing attack on HMAC and NMAC based on MD5 without related keys, which distinguishes the HMAC/NMAC-MD5 from HMAC/NMAC with a random function. The attack needs 297 queries, with a success probability 0.87, while the previous distinguishing attack on HMAC-MD5 reduced to 33 rounds takes 2126.1 messages with a ...
Xiaoyun Wang   +4 more
openaire   +1 more source

Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]

open access: yes, 2011
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations
Herrera Joancomartí, Jordi   +1 more
core   +4 more sources

SHA512 and MD5 Algorithm Vulnerability Testing Using Common Vulnerability Scoring System (CVSS)

open access: yesBuana Information Technology and Computer Sciences, 2022
This paper discusses the comparison of the results of testing the OTP (One Time Password) algorithm on two encryptions, namely SHA512 and MD5 which are applied to the Reconciliation Application of the Dinas Pemberdayaan Masyarakat dan Desa Kabupaten ...
Fahmi Basya   +2 more
doaj   +1 more source

Architecture based on MD5 and MD5-512 Bit Applications

open access: yesInternational Journal of Computer Applications, 2013
Researchers have found many flaws in hash function such as MD5 algorithm. It has been one of the most widely used hash algorithm and it has been indicated that there is a security threat in the algorithm. Furthermore, a MD5 hash output may not offer sufficient protection in the near future.
V. K Mishra, Vandana Pandey
openaire   +1 more source

Computation of periodic solution bifurcations in ODEs using bordered systems [PDF]

open access: yes, 2002
We consider numerical methods for the computation and continuation of the three generic secondary periodic solution bifurcations in autonomous ODEs, namely the fold, the period-doubling (or flip) bifurcation, and the torus (or Neimark–Sacker) bifurcation.
Doedel, E. J.   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy