Results 81 to 90 of about 169,700 (231)
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 [PDF]
This paper presents key recovery attacks on Sandwich-MAC instantiating MD5, where Sandwich-MAC is an improved variant of HMAC and achieves the same provable security level and better performance especially for short messages. The increased interest in lightweight cryptography motivates us to analyze such a MAC scheme. We first improve a distinguishing-
Yu Sasaki, Lei Wang
openaire +1 more source
A Performant, Scalable Processing Pipeline for High‐Quality and FAIR Environmental Sensor Data
Abstract High‐resolution environmental monitoring is necessary to record, understand, and predict biogeochemical and ecological changes particularly in coastal systems but brings significant challenges in processing and making rapidly available the resulting data.
Stephanie C. Pennington +14 more
wiley +1 more source
Abstract Among its objectives, the European Food Safety Authority working group on effect models in environmental risk assessment has worked towards the development and maintenance of a framework to facilitate the assessment of effect models within the scope of the European Food Safety Authority's activities. To fulfil this objective, the working group
European Food Safety Authority (EFSA) +8 more
wiley +1 more source
A Formula That Generates Hash Collisions
We present an explicit formula that produces hash collisions for the Merkle-Damg{\aa}rd construction. The formula works for arbitrary choice of message block and irrespective of the standardized constants used in hash functions, although some padding ...
Brockmann, Andrew
core
Sodium butyrate (NaB) has garnered attention in recent years for its ability to impede the malignant progression of tumors. In order to explore the potential inhibitory effects of NaB on the replication of Marek’s disease virus (MDV) and subsequent ...
Qiaoer Lin +14 more
doaj +1 more source
Improved collision detection of MD5 with additional sufficient conditions
Linan Fang +6 more
openalex +1 more source
An optimistic fair e-commerce protocol for large e-goods [PDF]
Suppose two entities that do not trust each other want to exchange some arbitrary data over a public channel. A fair exchange protocol ensures that both parties get what they want or neither gets anything.
Levi, Albert +4 more
core
Flexible Session Management in a Distributed Environment
Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers.
+17 more
core +2 more sources
Evaluation of the proximate composition, functional, and pasting properties of ichipipi maize flour
Ichipipi food is a traditional meal in Tanzania's southern highlands. In this study, ichipipi composite flour (MD) was produced using maize harvested at two different stages: milk (M) and dough (D) mixed at various ratios. Then, the proximate composition,
Princess Mpili +2 more
doaj +1 more source
The development of mobile applications is unbalanced with the level of its security which is vulnerable to hacker attacks. Some important things that need to be considered in the security of mobile applications are login and database system.
Hamdan Dian Jaya Rozi Hyang Utami +2 more
doaj +1 more source

