Results 21 to 30 of about 169,700 (231)

Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC [PDF]

open access: yes, 2009
In this paper, we present the first distinguishing attack on HMAC and NMAC based on MD5 without related keys, which distinguishes the HMAC/NMAC-MD5 from HMAC/NMAC with a random function. The attack needs 297 queries, with a success probability 0.87, while the previous distinguishing attack on HMAC-MD5 reduced to 33 rounds takes 2126.1 messages with a ...
Xiaoyun Wang   +4 more
openaire   +1 more source

SHA512 and MD5 Algorithm Vulnerability Testing Using Common Vulnerability Scoring System (CVSS)

open access: yesBuana Information Technology and Computer Sciences, 2022
This paper discusses the comparison of the results of testing the OTP (One Time Password) algorithm on two encryptions, namely SHA512 and MD5 which are applied to the Reconciliation Application of the Dinas Pemberdayaan Masyarakat dan Desa Kabupaten ...
Fahmi Basya   +2 more
doaj   +1 more source

Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]

open access: yes, 2011
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations
Herrera Joancomartí, Jordi   +1 more
core   +4 more sources

Architecture based on MD5 and MD5-512 Bit Applications

open access: yesInternational Journal of Computer Applications, 2013
Researchers have found many flaws in hash function such as MD5 algorithm. It has been one of the most widely used hash algorithm and it has been indicated that there is a security threat in the algorithm. Furthermore, a MD5 hash output may not offer sufficient protection in the near future.
V. K Mishra, Vandana Pandey
openaire   +1 more source

Multi-aspect, robust, and memory exclusive guest os fingerprinting [PDF]

open access: yes, 2014
Precise fingerprinting of an operating system (OS) is critical to many security and forensics applications in the cloud, such as virtual machine (VM) introspection, penetration testing, guest OS administration, kernel dump analysis, and memory forensics.
Fu, Y, Gu, Y, Lin, Z, Prakash, A, Yin, H
core   +1 more source

Computation of periodic solution bifurcations in ODEs using bordered systems [PDF]

open access: yes, 2002
We consider numerical methods for the computation and continuation of the three generic secondary periodic solution bifurcations in autonomous ODEs, namely the fold, the period-doubling (or flip) bifurcation, and the torus (or Neimark–Sacker) bifurcation.
Doedel, E. J.   +2 more
core   +2 more sources

Performance analysis of MD5 [PDF]

open access: yesACM SIGCOMM Computer Communication Review, 1995
MD5 is an authentication algorithm proposed as the required implementation of the authentication option in IPv6. This paper presents an analysis of the speed at which MD5 can be implemented in software and hardware, and discusses whether its use interferes with high bandwidth networking.
openaire   +1 more source

The Topology of Foliations Formed by the Generic K-Orbits of a Subclass of the Indecomposable MD5-Groups

open access: yes, 2008
The present paper is a continuation of [13], [14] of the authors. Specifically, the paper considers the MD5-foliations associated to connected and simply connected MD5-groups such that their Lie algebras have 4-dimensional commutative derived ideal.
A. A. Kirillov   +16 more
core   +1 more source

NetCDF model output of the entire state of the surface layer, including simulated dFe dyes, of the circum-Antarctic [PDF]

open access: yes, 2020
Dataset: Antarctic dFe model dyesFor a complete list of measurements, refer to the full dataset description in the supplemental file 'Dataset_description.pdf'.
Arrigo, Kevin R.   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy