Results 21 to 30 of about 160,083 (235)

A VHDL Model for Implementation of MD5 Hash Algorithm [PDF]

open access: diamondEngineering and Technology Journal, 2013
With the increase of the amount of data and users in the information systems, the requirement of data integrity is needed to be improved as well, so the work has become necessary independently.
Mohammed A. Noaman
doaj   +2 more sources

MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners [PDF]

open access: bronze, 2009
We consider a long standing problem in cryptanalysis: attacks on hash function combiners. In this paper, we propose the first attack that allows collision attacks on combiners with a runtime below the birthday-bound of the smaller compression function. This answers an open question by Joux posed in 2004.
Mendel, Florian   +2 more
openaire   +4 more sources

Design and implementation of an ASIP-based cryptography processor for AES, IDEA, and MD5

open access: diamondEngineering Science and Technology, an International Journal, 2017
In this paper, a new 32-bit ASIP-based crypto processor for AES, IDEA, and MD5 is designed. The instruction-set consists of both general purpose and specific instructions for the above cryptographic algorithms. The proposed architecture has nine function
Karim Shahbazi   +2 more
doaj   +2 more sources

Marek's Disease Virus (MDV) Meq Oncoprotein Plays Distinct Roles in Tumor Incidence, Distribution, and Size. [PDF]

open access: yesViruses
Marek’s disease (MD), characterized by the rapid onset of T-cell lymphomas in chickens, is caused by Mardivirus gallidalpha2, an oncogenic alphaherpesvirus commonly known as Marek’s disease virus (MDV).
Ajithdoss DK   +3 more
europepmc   +2 more sources

Influence of Training Load on Muscle Contractile Properties in Semi-Professional Female Soccer Players Across a Competitive Microcycle: A Pilot Study. [PDF]

open access: yesSensors (Basel)
This study aimed to evaluate changes in muscle contractile properties during a training microcycle in semi-professional female football players and explore their relationship with training load variables.
Rey E   +4 more
europepmc   +2 more sources

Dynamic Changes in Viral Loads during Co-Infection with a Recombinant Turkey Herpesvirus Vector Vaccine and Very Virulent Marek's Disease Virus In Vivo. [PDF]

open access: yesViruses
Marek’s disease (MD), caused by the Marek’s disease virus (MDV), is a common infectious tumor disease in chickens and was the first neoplastic disease preventable by vaccination.
Ding T   +9 more
europepmc   +2 more sources

Improved collision detection of MD5 with additional sufficient conditions

open access: yesElectronic Research Archive, 2022
One application of counter-cryptanalysis is detecting whether a message block is involved in a collision attack, such as the detection of MD5 and SHA-1. Stevens and Shumow speeded up the detection of SHA-1 by introducing unavoidable conditions in message
Linan Fang   +6 more
doaj   +1 more source

Marek's disease virus-1 unique gene LORF1 is involved in viral replication and MDV-1/Md5-induced atrophy of the bursa of Fabricius. [PDF]

open access: goldPLoS Pathog
Bao C   +20 more
europepmc   +2 more sources

An Electro-optical Hybrid Encryption Method based on MD5 Verification

open access: yesGuangtongxin yanjiu, 2022
In view of insufficient security in the next generation passive optical network, an electro-optic hybrid encryption scheme based on MD5 message digest algorithm check is proposed in this paper.
XUAN Ran   +5 more
doaj   +3 more sources

Password Data Authentication Using a Combination of MD5 and Playfair Cipher Matrix 13x13

open access: yesBuana Information Technology and Computer Sciences, 2020
Data security and confidentiality are the most important things that must be considered in information systems. To protect the cryptographic algorithm reliability it uses.
Bayu Priyatna, April Lia Hananto
doaj   +1 more source

Home - About - Disclaimer - Privacy