Results 31 to 40 of about 160,083 (235)

Inverting Cryptographic Hash Functions via Cube-and-Conquer [PDF]

open access: yesJ. Artif. Intell. Res. Vol. 81 (2024), 2022
MD4 and MD5 are fundamental cryptographic hash functions proposed in the early 1990s. MD4 consists of 48 steps and produces a 128-bit hash given a message of arbitrary finite size. MD5 is a more secure 64-step extension of MD4. Both MD4 and MD5 are vulnerable to practical collision attacks, yet it is still not realistic to invert them, i.e., to find a ...
arxiv   +1 more source

PENERAPAN ALGORITMA MESSAGE DIGEST 5 PADA FILE VIDEO

open access: yesJurnal Saintekom, 2020
The use of video documents as one of the media to convey information is very widely used today. Where is evident in some social networking applications contain a lot of content about information in the form of videos.
Rivalri Kristianto Hondro
doaj   +1 more source

Pathogenicity and Pathotype Analysis of Henan Isolates of Marek’s Disease Virus Reveal Long-Term Circulation of Highly Virulent MDV Variant in China

open access: yesViruses, 2022
In recent years, outbreaks of Marek’s disease (MD) have been frequently reported in vaccinated chicken flocks in China. Herein, we have demonstrated that four Marek’s disease virus (MDV) isolates, HN502, HN302, HN304, and HN101, are all pathogenic and ...
Man Teng   +9 more
doaj   +1 more source

Is a Quantum Gravity Era Necessary? [PDF]

open access: yesRevies in Physics 13 (2025) 100116 (https://www.sciencedirect.com/science/article/pii/S2405428325000152/pdfft?md5=d9428e037e6b5b0f5e22630d636ca828&pid=1-s2.0-S2405428325000152-main.pdf), 2023
We present the first published framework of the entirety of cosmological history which is thoroughly classical (without any quantum-gravitational era or singularities) and which passes all the known extensive consistency checks on such a model, and discuss some of its possible cosmological implications, such as its ability to account for the matter ...
arxiv   +1 more source

A Novel Improvement With an Effective Expansion to Enhance the MD5 Hash Function for Verification of a Secure E-Document

open access: yesIEEE Access, 2020
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection and privacy and subsequently reduce data usage.
Ammar Mohammed Ali, Alaa Kadhim Farhan
doaj   +1 more source

Implementasi Enkripsi Data MD5 dan SHA-256 pada Sistem Informasi Peminjaman Buku Tanah

open access: yesTechno.Com, 2023
Setiap lapisan masyarakat harus memperhatikan keamanan sistem informasi untuk menghindari kejahatan dunia maya. Keadaan ini menimbulkan risiko yang harus dikelola untuk melindungi aset dari kejahatan dunia maya.
Hajra Rasmita Ngemba   +3 more
doaj   +1 more source

تحسين خوارزمية MD5 بالاعتماد على عدة طرق

open access: yesمجلة الغري للعلوم الاقتصادية والادارية, 2017
المستخلص خوارزميات Hash  هي الجزء المهم في العديد من تطبيقات التشفير والبروتوكولات الأمنية .  هذا البحث يعمل على تعزيز خوارزميةMD5  ضد بعض الهجمات. التطوير الذي تم اعتماده في تحسين خوارزمية MD5  هو  استخدام DNA coding ، والمعادلات الغير خطية (NLFSR ...
علاء فرحان   +1 more
doaj   +1 more source

Desain Aplikasi Algoritma MD5 (Message Digest 5) Pada Media SMS Berbasis Android Mobile

open access: yesDigital Zone: Jurnal Teknologi Informasi dan Komunikasi, 2017
Abstrak- Tulisan ini membahas tentang disain Aplikasi Algoritma MD5. Dalam desain ini dibuat model kirim dan terima SMS aman. Dari model ini bisa dibuat desain aplikasi berbasis objek menggunakan Unified Modeling Language (UML), State Machine untuk ...
Zaiful Bahri   +2 more
doaj   +3 more sources

Applying Grover's Algorithm to Hash Functions: A Software Perspective [PDF]

open access: yes, 2022
Quantum software frameworks provide software engineers with the tools to study quantum algorithms as applied to practical problems. We implement classical hash functions MD5, SHA-1, SHA-2, and SHA-3 as quantum oracles to study the computational resource requirements of conducting a preimage attack with Grover's Algorithm. We introduce an improvement to
arxiv   +1 more source

Issuing Digital Signatures for Integrity and Authentication of Digital Documents

open access: yesAl-Mustansiriyah Journal of Science, 2023
In this paper, we developed a secure system for issuing digital signature for digital documents and certificates using message digest algorithm (MD5). The developed system is providing the integrity and authentication for certificates by combining the ...
Hassan Kassim Albahadily   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy