Results 41 to 50 of about 12,815 (252)

PENERAPAN ALGORITMA MESSAGE DIGEST 5 PADA FILE VIDEO

open access: yesJurnal Saintekom, 2020
The use of video documents as one of the media to convey information is very widely used today. Where is evident in some social networking applications contain a lot of content about information in the form of videos.
Rivalri Kristianto Hondro
doaj   +1 more source

Pathogenicity and Pathotype Analysis of Henan Isolates of Marek’s Disease Virus Reveal Long-Term Circulation of Highly Virulent MDV Variant in China

open access: yesViruses, 2022
In recent years, outbreaks of Marek’s disease (MD) have been frequently reported in vaccinated chicken flocks in China. Herein, we have demonstrated that four Marek’s disease virus (MDV) isolates, HN502, HN302, HN304, and HN101, are all pathogenic and ...
Man Teng   +9 more
doaj   +1 more source

Enkripsi Base 64, Hashing SHA1 dan MD5 pada QR Code Presensi Kuliah

open access: yesJSAI (Journal Scientific and Applied Informatics), 2021
The lecture attendance application at the University of Muhammadiyah Bengkulu needs to be developed so that it is easier in the implementation process. One way to simplify the process is to use the presence of a Quick Response Code which can be done in ...
Presensi Kuliah   +2 more
semanticscholar   +1 more source

تحسين خوارزمية MD5 بالاعتماد على عدة طرق

open access: yesمجلة الغري للعلوم الاقتصادية والادارية, 2017
المستخلص خوارزميات Hash  هي الجزء المهم في العديد من تطبيقات التشفير والبروتوكولات الأمنية .  هذا البحث يعمل على تعزيز خوارزميةMD5  ضد بعض الهجمات. التطوير الذي تم اعتماده في تحسين خوارزمية MD5  هو  استخدام DNA coding ، والمعادلات الغير خطية (NLFSR ...
علاء فرحان   +1 more
doaj   +1 more source

Desain Aplikasi Algoritma MD5 (Message Digest 5) Pada Media SMS Berbasis Android Mobile

open access: yesDigital Zone: Jurnal Teknologi Informasi dan Komunikasi, 2017
Abstrak- Tulisan ini membahas tentang disain Aplikasi Algoritma MD5. Dalam desain ini dibuat model kirim dan terima SMS aman. Dari model ini bisa dibuat desain aplikasi berbasis objek menggunakan Unified Modeling Language (UML), State Machine untuk ...
Zaiful Bahri   +2 more
doaj   +3 more sources

Applying Grover's Algorithm to Hash Functions: A Software Perspective [PDF]

open access: yes, 2022
Quantum software frameworks provide software engineers with the tools to study quantum algorithms as applied to practical problems. We implement classical hash functions MD5, SHA-1, SHA-2, and SHA-3 as quantum oracles to study the computational resource requirements of conducting a preimage attack with Grover's Algorithm. We introduce an improvement to
arxiv   +1 more source

Issuing Digital Signatures for Integrity and Authentication of Digital Documents

open access: yesAl-Mustansiriyah Journal of Science, 2023
In this paper, we developed a secure system for issuing digital signature for digital documents and certificates using message digest algorithm (MD5). The developed system is providing the integrity and authentication for certificates by combining the ...
Hassan Kassim Albahadily   +3 more
doaj   +1 more source

Criptografía y seguridad en M-COMMERCE

open access: yesRevista Científica Ciencia y Tecnología, 2017
El presente trabajo analiza los parámetros de seguridad más utilizados en el comercio electrónico realizado a través de dispositivos móviles (m-commerce), dentro de este se hace referencia a los tipos de cifrados que se usan con el fin de precautelar la ...
Cristhian Romero Romero   +2 more
doaj   +1 more source

FPGA Design and Implementation of Data Covering Based on MD5 Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2016
The protection of information leads to protection of individual privacy for everyone. This protection is performed using encryption. Many types of encryption may be utilized while the simplest one is the covering of information.
Thamir R. Saeed
doaj   +1 more source

Chosen-prefix collisions for MD5 and applications [PDF]

open access: yesInternational Journal of Applied Cryptography, 2012
We present a novel, automated way to find differential paths for MD5. Its main application is in the construction of chosen-prefix collisions. We have shown how, at an approximate expected cost of 239 calls to the MD5 compression function, for any two chosen message prefixes P and P', suffixes S and S' can be constructed such that the concatenated ...
Stevens, M.   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy