Results 81 to 90 of about 169,700 (231)

Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 [PDF]

open access: yes, 2014
This paper presents key recovery attacks on Sandwich-MAC instantiating MD5, where Sandwich-MAC is an improved variant of HMAC and achieves the same provable security level and better performance especially for short messages. The increased interest in lightweight cryptography motivates us to analyze such a MAC scheme. We first improve a distinguishing-
Yu Sasaki, Lei Wang
openaire   +1 more source

A Performant, Scalable Processing Pipeline for High‐Quality and FAIR Environmental Sensor Data

open access: yesJournal of Geophysical Research: Biogeosciences, Volume 130, Issue 11, November 2025.
Abstract High‐resolution environmental monitoring is necessary to record, understand, and predict biogeochemical and ecological changes particularly in coastal systems but brings significant challenges in processing and making rapidly available the resulting data.
Stephanie C. Pennington   +14 more
wiley   +1 more source

EFSA statement on the interpretation of FAIR principles for mechanistic effect models in the regulatory environmental risk assessment of pesticides

open access: yesEFSA Journal, Volume 23, Issue 11, November 2025.
Abstract Among its objectives, the European Food Safety Authority working group on effect models in environmental risk assessment has worked towards the development and maintenance of a framework to facilitate the assessment of effect models within the scope of the European Food Safety Authority's activities. To fulfil this objective, the working group
European Food Safety Authority (EFSA)   +8 more
wiley   +1 more source

A Formula That Generates Hash Collisions

open access: yes, 2018
We present an explicit formula that produces hash collisions for the Merkle-Damg{\aa}rd construction. The formula works for arbitrary choice of message block and irrespective of the standardized constants used in hash functions, although some padding ...
Brockmann, Andrew
core  

Sodium butyrate impedes the lymphoma caused by Marek’s disease virus via regulating the mitochondrial apoptosis pathway

open access: yesFrontiers in Veterinary Science
Sodium butyrate (NaB) has garnered attention in recent years for its ability to impede the malignant progression of tumors. In order to explore the potential inhibitory effects of NaB on the replication of Marek’s disease virus (MDV) and subsequent ...
Qiaoer Lin   +14 more
doaj   +1 more source

Improved collision detection of MD5 with additional sufficient conditions

open access: gold, 2022
Linan Fang   +6 more
openalex   +1 more source

An optimistic fair e-commerce protocol for large e-goods [PDF]

open access: yes, 2006
Suppose two entities that do not trust each other want to exchange some arbitrary data over a public channel. A fair exchange protocol ensures that both parties get what they want or neither gets anything.
Levi, Albert   +4 more
core  

Flexible Session Management in a Distributed Environment

open access: yes, 2010
Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers.
  +17 more
core   +2 more sources

Evaluation of the proximate composition, functional, and pasting properties of ichipipi maize flour

open access: yesApplied Food Research
Ichipipi food is a traditional meal in Tanzania's southern highlands. In this study, ichipipi composite flour (MD) was produced using maize harvested at two different stages: milk (M) and dough (D) mixed at various ratios. Then, the proximate composition,
Princess Mpili   +2 more
doaj   +1 more source

Security Login System on Mobile Application with Implementation of Advanced Encryption Standard (AES) using 3 Keys Variation 128-bit, 192-bit, and 256-bit

open access: yesScientific Journal of Informatics, 2019
The development of mobile applications is unbalanced with the level of its security which is vulnerable to hacker attacks. Some important things that need to be considered in the security of mobile applications are login and database system.
Hamdan Dian Jaya Rozi Hyang Utami   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy