A VHDL Model for Implementation of MD5 Hash Algorithm [PDF]
With the increase of the amount of data and users in the information systems, the requirement of data integrity is needed to be improved as well, so the work has become necessary independently.
Mohammed A. Noaman
doaj +2 more sources
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners [PDF]
We consider a long standing problem in cryptanalysis: attacks on hash function combiners. In this paper, we propose the first attack that allows collision attacks on combiners with a runtime below the birthday-bound of the smaller compression function. This answers an open question by Joux posed in 2004.
Mendel, Florian+2 more
openaire +4 more sources
Design and implementation of an ASIP-based cryptography processor for AES, IDEA, and MD5
In this paper, a new 32-bit ASIP-based crypto processor for AES, IDEA, and MD5 is designed. The instruction-set consists of both general purpose and specific instructions for the above cryptographic algorithms. The proposed architecture has nine function
Karim Shahbazi+2 more
doaj +2 more sources
Marek's Disease Virus (MDV) Meq Oncoprotein Plays Distinct Roles in Tumor Incidence, Distribution, and Size. [PDF]
Marek’s disease (MD), characterized by the rapid onset of T-cell lymphomas in chickens, is caused by Mardivirus gallidalpha2, an oncogenic alphaherpesvirus commonly known as Marek’s disease virus (MDV).
Ajithdoss DK+3 more
europepmc +2 more sources
Influence of Training Load on Muscle Contractile Properties in Semi-Professional Female Soccer Players Across a Competitive Microcycle: A Pilot Study. [PDF]
This study aimed to evaluate changes in muscle contractile properties during a training microcycle in semi-professional female football players and explore their relationship with training load variables.
Rey E+4 more
europepmc +2 more sources
Dynamic Changes in Viral Loads during Co-Infection with a Recombinant Turkey Herpesvirus Vector Vaccine and Very Virulent Marek's Disease Virus In Vivo. [PDF]
Marek’s disease (MD), caused by the Marek’s disease virus (MDV), is a common infectious tumor disease in chickens and was the first neoplastic disease preventable by vaccination.
Ding T+9 more
europepmc +2 more sources
Improved collision detection of MD5 with additional sufficient conditions
One application of counter-cryptanalysis is detecting whether a message block is involved in a collision attack, such as the detection of MD5 and SHA-1. Stevens and Shumow speeded up the detection of SHA-1 by introducing unavoidable conditions in message
Linan Fang+6 more
doaj +1 more source
Marek's disease virus-1 unique gene LORF1 is involved in viral replication and MDV-1/Md5-induced atrophy of the bursa of Fabricius. [PDF]
Bao C+20 more
europepmc +2 more sources
An Electro-optical Hybrid Encryption Method based on MD5 Verification
In view of insufficient security in the next generation passive optical network, an electro-optic hybrid encryption scheme based on MD5 message digest algorithm check is proposed in this paper.
XUAN Ran+5 more
doaj +3 more sources
Password Data Authentication Using a Combination of MD5 and Playfair Cipher Matrix 13x13
Data security and confidentiality are the most important things that must be considered in information systems. To protect the cryptographic algorithm reliability it uses.
Bayu Priyatna, April Lia Hananto
doaj +1 more source