Results 21 to 30 of about 12,815 (252)

DIGITAL SIGNATURE PADA CITRA MENGGUNAKAN RSA DAN VIGENERE CIPHER BERBASIS MD5

open access: diamondSimetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer, 2019
Salah satu teknik yang populer untuk mengamankan data dengan tingkat keamanan yang tinggi yaitu kriptografi. Berbagai penelitian telah dilakukan dengan menggabungkan kunci simteris dan kunci asimteris untuk mendapatkan keamanan ganda.
Lekso Budi Handoko   +3 more
doaj   +3 more sources

Add "Salt" MD5 Algorithm’s FPGA Implementation

open access: goldProcedia Computer Science, 2018
Abstract At present, the MD5 algorithm in network security of got to a wide range of applications in many respects, but in be used actually face being hit by a "rainbow table" library of security risks, this design adopts the method of "salt", based on the proposed encryption definitely added to the random Numbers to reduce the risk.
Ye Tian   +4 more
openalex   +3 more sources

A Study of the MD5 Attacks: Insights and Improvements [PDF]

open access: bronze, 2006
MD5 is a well-known and widely-used cryptographic hash function. It has received renewed attention from researchers subsequent to the recent announcement of collisions found by Wang et al. [16]. To date, however, the method used by researchers in this work has been fairly difficult to grasp.
John Black   +2 more
openalex   +4 more sources

Sodium butyrate impedes the lymphoma caused by Marek’s disease virus via regulating the mitochondrial apoptosis pathway [PDF]

open access: yesFrontiers in Veterinary Science
Sodium butyrate (NaB) has garnered attention in recent years for its ability to impede the malignant progression of tumors. In order to explore the potential inhibitory effects of NaB on the replication of Marek’s disease virus (MDV) and subsequent ...
Qiaoer Lin   +14 more
doaj   +2 more sources

Hardware implementation of the MD5 algorithm.

open access: bronzeIFAC Proceedings Volumes, 2009
Abstract The paper presents a hardware implementation of the MD5 hash generator. The generator comprises MD5 processing unit, data exchange interface and memory block for storing input messages. A general concept and implementation of the MD5 generator modules is described.
Danuta Pamuła, Adam Ziębiński
openalex   +3 more sources

A VHDL Model for Implementation of MD5 Hash Algorithm [PDF]

open access: diamondEngineering and Technology Journal, 2013
With the increase of the amount of data and users in the information systems, the requirement of data integrity is needed to be improved as well, so the work has become necessary independently.
Mohammed A. Noaman
doaj   +2 more sources

A novel adaptive weight bi-directional long short-term memory (AWBi-LSTM) classifier model for heart stroke risk level prediction in IoT [PDF]

open access: yesPeerJ Computer Science
Stroke prediction has become one of the significant research areas due to the increasing fatality rate. Hence, this article proposes a novel Adaptive Weight Bi-Directional Long Short-Term Memory (AWBi-LSTM) classifier model for stroke risk level ...
S Thumilvannan, R Balamanigandan
doaj   +3 more sources

Encryption and Decryption using Password Based Encryption, MD5, and DES [PDF]

open access: gold, 2018
—Password-Based Encryption gets the encryption key from the password. To make the task from keyword to key is very time-consuming for an attacker, most implementations of Password-based Encryption will be combined with a randomization system, known as ...
Hanna Willa Dhany   +4 more
openalex   +2 more sources

MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners [PDF]

open access: bronze, 2009
We consider a long standing problem in cryptanalysis: attacks on hash function combiners. In this paper, we propose the first attack that allows collision attacks on combiners with a runtime below the birthday-bound of the smaller compression function. This answers an open question by Joux posed in 2004.
Florian Mendel   +2 more
openalex   +5 more sources

Marek's disease virus-1 unique gene LORF1 is involved in viral replication and MDV-1/Md5-induced atrophy of the bursa of Fabricius. [PDF]

open access: goldPLoS Pathog
Bao C   +20 more
europepmc   +2 more sources

Home - About - Disclaimer - Privacy