DIGITAL SIGNATURE PADA CITRA MENGGUNAKAN RSA DAN VIGENERE CIPHER BERBASIS MD5
Salah satu teknik yang populer untuk mengamankan data dengan tingkat keamanan yang tinggi yaitu kriptografi. Berbagai penelitian telah dilakukan dengan menggabungkan kunci simteris dan kunci asimteris untuk mendapatkan keamanan ganda.
Lekso Budi Handoko+3 more
doaj +3 more sources
Add "Salt" MD5 Algorithm’s FPGA Implementation
Abstract At present, the MD5 algorithm in network security of got to a wide range of applications in many respects, but in be used actually face being hit by a "rainbow table" library of security risks, this design adopts the method of "salt", based on the proposed encryption definitely added to the random Numbers to reduce the risk.
Ye Tian+4 more
openalex +3 more sources
A Study of the MD5 Attacks: Insights and Improvements [PDF]
MD5 is a well-known and widely-used cryptographic hash function. It has received renewed attention from researchers subsequent to the recent announcement of collisions found by Wang et al. [16]. To date, however, the method used by researchers in this work has been fairly difficult to grasp.
John Black+2 more
openalex +4 more sources
Sodium butyrate impedes the lymphoma caused by Marek’s disease virus via regulating the mitochondrial apoptosis pathway [PDF]
Sodium butyrate (NaB) has garnered attention in recent years for its ability to impede the malignant progression of tumors. In order to explore the potential inhibitory effects of NaB on the replication of Marek’s disease virus (MDV) and subsequent ...
Qiaoer Lin+14 more
doaj +2 more sources
Hardware implementation of the MD5 algorithm.
Abstract The paper presents a hardware implementation of the MD5 hash generator. The generator comprises MD5 processing unit, data exchange interface and memory block for storing input messages. A general concept and implementation of the MD5 generator modules is described.
Danuta Pamuła, Adam Ziębiński
openalex +3 more sources
A VHDL Model for Implementation of MD5 Hash Algorithm [PDF]
With the increase of the amount of data and users in the information systems, the requirement of data integrity is needed to be improved as well, so the work has become necessary independently.
Mohammed A. Noaman
doaj +2 more sources
A novel adaptive weight bi-directional long short-term memory (AWBi-LSTM) classifier model for heart stroke risk level prediction in IoT [PDF]
Stroke prediction has become one of the significant research areas due to the increasing fatality rate. Hence, this article proposes a novel Adaptive Weight Bi-Directional Long Short-Term Memory (AWBi-LSTM) classifier model for stroke risk level ...
S Thumilvannan, R Balamanigandan
doaj +3 more sources
Encryption and Decryption using Password Based Encryption, MD5, and DES [PDF]
—Password-Based Encryption gets the encryption key from the password. To make the task from keyword to key is very time-consuming for an attacker, most implementations of Password-based Encryption will be combined with a randomization system, known as ...
Hanna Willa Dhany+4 more
openalex +2 more sources
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners [PDF]
We consider a long standing problem in cryptanalysis: attacks on hash function combiners. In this paper, we propose the first attack that allows collision attacks on combiners with a runtime below the birthday-bound of the smaller compression function. This answers an open question by Joux posed in 2004.
Florian Mendel+2 more
openalex +5 more sources
Marek's disease virus-1 unique gene LORF1 is involved in viral replication and MDV-1/Md5-induced atrophy of the bursa of Fabricius. [PDF]
Bao C+20 more
europepmc +2 more sources