|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 207 occurrences of 117 keywords
|
|
|
Results
Found 249 publication records. Showing 249 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
125 | Yu Sasaki, Kazumaro Aoki |
Finding Preimages in Full MD5 Faster Than Exhaustive Search. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
splice-and-cut, hash function, MD5, preimage, one-way, local collision |
125 | Yu Sasaki, Kazumaro Aoki |
Preimage Attacks on Step-Reduced MD5. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Message Expansion, Hash Function, MD5, Preimage Attack, One-Way, Local Collision |
120 | Xiaoyun Wang 0001, Hongbo Yu, Wei Wang 0035, Haina Zhang, Tao Zhan |
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
MDx-MAC, Distinguishing attack, MD5, Key recovery, HMAC, NMAC |
102 | Joseph D. Touch |
Performance Analysis of MD5. |
SIGCOMM |
1995 |
DBLP DOI BibTeX RDF |
Internet |
98 | Marc Stevens 0001, Alexander Sotirov, Jacob Appelbaum, Arjen K. Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger |
Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
PlayStation 3, certificate, collision attack, MD5 |
98 | Jie Liang, Xuejia Lai |
Improved Collision Attack on Hash Function MD5. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
hash function, collision, MD5, differential attack |
89 | Marc Stevens 0001, Arjen K. Lenstra, Benne de Weger |
Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities. |
EUROCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
89 | Kimmo U. Järvinen, Matti Tommiska, Jorma Skyttä |
Hardware Implementation Analysis of the MD5 Hash Algorithm. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
85 | Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro |
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
MD5, key-recovery, HMAC, differential attack, MD4, NMAC, near-collision |
85 | Michael Szydlo, Yiqun Lisa Yin |
Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
signature, MD5, SHA-1, padding, hash collision |
85 | Markku-Juhani Olavi Saarinen |
Cryptanalysis of Block Ciphers Based on SHA-1 and MD5. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
SHACAL, Dedicated hash functions, MDC, MD5, SHA-1, Slide attacks |
75 | John Black, Martin Cochran, Trevor Highland |
A Study of the MD5 Attacks: Insights and Improvements. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
|
75 | Bert den Boer, Antoon Bosselaers |
Collisions for the Compressin Function of MD5. |
EUROCRYPT |
1993 |
DBLP DOI BibTeX RDF |
|
71 | Florian Mendel, Christian Rechberger, Martin Schläffer |
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash functions, combiner, differential, MD5 |
71 | Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen |
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
collisions, MD5, key-recovery, HMAC, MD4, NMAC, differential path |
64 | Yu Sasaki, Gaoli Wang, Lei Wang 0031 |
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2015 |
DBLP DOI BibTeX RDF |
|
62 | Shiwei Chen, Chenhui Jin |
An Improved Collision Attack on MD5 Algorithm. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
|
62 | Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong |
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Xiaoyun Wang 0001, Hongbo Yu |
How to Break MD5 and Other Hash Functions. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
58 | Jirí Vábek, Daniel Joscák, Milan Bohácek, Jirí Tuma |
A New Type of 2-Block Collisions in MD5. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Stevens algorithm, collisions, MD5, differential paths |
58 | Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro |
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
APOP, Challenge and Response, Password Recovery, Message Difference, Hash Function, Collision Attack, MD5 |
48 | Anh Tuan Hoang, Katsuhiro Yamazaki, Shigeru Oyanagi |
Multi-stage Pipelining MD5 Implementations on FPGA with Data Forwarding. |
FCCM |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee 0002 |
On the Security of Encryption Modes of MD4, MD5 and HAVAL. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Mao-Yin Wang, Chih-Pin Su, Chih-Tsun Huang, Cheng-Wen Wu |
An HMAC processor with integrated SHA-1 and MD5 algorithms. |
ASP-DAC |
2004 |
DBLP DOI BibTeX RDF |
|
48 | Il-Gon Kim, Jin-Young Choi |
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking. |
AINA (2) |
2004 |
DBLP DOI BibTeX RDF |
|
48 | Thomas A. Berson |
Differential Cryptanalysis Mod 2^32 with Applications to MD5. |
EUROCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
46 | Hans Dobbertin |
Cryptanalysis of MD4. |
J. Cryptol. |
1998 |
DBLP DOI BibTeX RDF |
Dedicated hash functions, RIPEMD, Dedicated hash functions, RIPEMD, Collisions, Collisions, Key words, MD5, MD5, MD4, MD4 |
44 | Gaëtan Leurent |
Message Freedom in MD4 and MD5 Collisions: Application to APOP. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
message modification, meaningful collisions, APOP security, Hash function, MD5, MD4 |
43 | Yu Sasaki, Lei Wang 0031 |
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5. |
Selected Areas in Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
43 | Sean Turner, Lily Chen |
Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms. |
RFC |
2011 |
DBLP DOI BibTeX RDF |
|
43 | Yu Sasaki |
Collisions of MMO-MD5 and Their Impact on Original MD5. |
AFRICACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
40 | Naomi Fujimura, Jin Mei |
Implementation of file interpolation detection system. |
SIGUCCS |
2007 |
DBLP DOI BibTeX RDF |
file interpolation, security, management, web server |
36 | Lei Wang 0031, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta |
Bit-Free Collision: Application to APOP Attack. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
bit-free collision, APOP, hash function, MD5, MD4 |
36 | Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede |
Design Methodology for Throughput Optimum Architectures of Hash Algorithms of the MD4-class. |
J. Signal Process. Syst. |
2008 |
DBLP DOI BibTeX RDF |
Architecture design methodology, MD4-based hash algorithm, SHA1, RIPEMD-160, Iteration bound analysis, DFG (Data Flow Graph) transformation, Throughput optimization, MD5 |
36 | Xunhua Wang, Yih Huang, Yvo Desmedt, David Rine |
Enabling Secure On-Line DNS Dynamic Update. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
secure online DNS dynamic update, Internet Engineering Task Force, DNS Security Extension, zone security key, role separation principle, signature computation time, Internet, authentication, cryptography, distributed databases, RSA, transport protocols, experimental results, message authentication, threshold cryptography, telecommunication security, MD5, Domain Name System, IP addresses, performance penalty, DNSSEC |
35 | Chen-Hsing Wang, Chih-Yen Lo, Min-Sheng Lee, Jen-Chieh Yeh, Chih-Tsun Huang, Cheng-Wen Wu, Shi-Yu Huang |
A network security processor design based on an integrated SOC design and test platform. |
DAC |
2006 |
DBLP DOI BibTeX RDF |
HMAC-MD5, HMAC-SHA1, AES, RSA, AMBA, RNG |
35 | |
Message Digest (MD5) Algorithm and Secure Hash Algorithm (SHA). |
Encyclopedia of Multimedia |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Akashi Satoh, Tadanobu Inoue |
ASIC-Hardware-Focused Comparison for Hash Functions MD5, RIPEMD-160, and SHS. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Bart Preneel |
The State of Hash Functions and the NIST SHA-3 Competition. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Deepak Sreedharan, Ali Akoglu |
A hybrid processing element based reconfigurable architecture for hashing algorithms. |
IPDPS |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Christian Rechberger, Vincent Rijmen |
On Authentication with HMAC and Non-random Properties. |
Financial Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Hyung-Woo Lee |
Secure Authentication and Accounting Mechanism on WLAN with Interaction of Mobile Message Service. |
HCI (6) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Ahto Buldas, Sven Laur |
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Daniel Joscák, Jirí Tuma |
Multi-block Collisions in Hash Functions Based on 3C and 3C+ Enhancements of the Merkle-Damgård Construction. |
ICISC |
2006 |
DBLP DOI BibTeX RDF |
multi-block collision attack, 3C and 3C+ constructions, hash functions |
27 | Yu Sasaki, Yusuke Naito 0001, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta |
How to Construct Sufficient Conditions for Hash Functions. |
VIETCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Chang-Chun Cheng, Wei-Ming Chen, Han-Chieh Chao, Yao-Po Wang |
FPGA Authentication Header (AH) Implementation for Internet Appliances. |
PRDC |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Jin Zhi, Chung-Horng Lung, Xia Xu, Anand Srinivasan, Yi Lei |
Securing RSVP and RSVP-TE signaling protocols and their performance study. |
ITRE |
2005 |
DBLP DOI BibTeX RDF |
|
27 | William Aiello, Stuart Haber, Ramarathnam Venkatesan |
New Constructions for Secure Hash Functions. |
FSE |
1998 |
DBLP DOI BibTeX RDF |
|
27 | Mihir Bellare, Phillip Rogaway |
Collision-Resistant Hashing: Towards Making UOWHFs Practical. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
27 | Mihir Bellare, Roch Guérin, Phillip Rogaway |
XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
27 | Paul C. van Oorschot, Michael J. Wiener |
Parallel Collision Search with Application to Hash Functions and Discrete Logarithms. |
CCS |
1994 |
DBLP DOI BibTeX RDF |
|
23 | Khidir M. Ali, Ali Al-Khlifa |
A Comparative Study of Authentication Methods for Wi-Fi Networks. |
CICSyN |
2011 |
DBLP DOI BibTeX RDF |
IEEE802.11X, LEAP, PEAP, TTLS, TLS, MD5, FAST, EAP |
23 | Sandip Dutta, Avijit Kar, N. C. Mahanti, B. N. Chatterji |
Network Security Using Biometric and Cryptography. |
ACIVS |
2008 |
DBLP DOI BibTeX RDF |
Cryptography, Biometric, Watermarking, DES, MD5 |
22 | Jon Allen, Jeff Wilson |
Securing a wireless network. |
SIGUCCS |
2002 |
DBLP DOI BibTeX RDF |
EAP-LEAP, EAP-MD5, EAP-TLS, EAP-TTLS, VPN, WEP, 802.11i, 802.1x |
21 | Ayhan Renklier, Serkan Öztürk |
Image authentication and recovery: Sudoku puzzle and MD5 hash algorithm based self-embedding fragile image watermarking method. |
Multim. Tools Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
21 | Nitha C. Velayudhan, A. Anitha, Mukesh Madanan |
Sybil attack detection and secure data transmission in VANET using CMEHA-DNN and MD5-ECC. |
J. Ambient Intell. Humaniz. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Hayder Al-Ghanimi, Mohammed Q. Mohammed, Malik Kareem Kadhim Alzeyadi, Tamarah Alaa Diame, Faris Hassan Taha Aldabbagh, Mustafa Altaee |
Detection of Attacks by Assessing the Performance of MD2, MD5 and SHA-1 Hashing Algorithms. |
IC3I |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Kavin Kumar K, Nandhini V. D, Kowsalya M, Ragu P. J, Raghapriya N. R, S. Maheswaran 0001 |
Designing and validating an MD5 Hash Algorithm using the UVM Verification Framework and Checkers. |
ICCCNT |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Umesh Kumar, V. Ch. Venkaiah |
An Efficient Message Authentication Code Based on Modified MD5-384 Bits Hash Function and Quasigroup. |
Int. J. Cloud Appl. Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Yanzhao Shen, Ting Wu 0001, Gaoli Wang, Xinfeng Dong, Haifeng Qian |
Improved Collision Detection Of MD5 Using Sufficient Condition Combination. |
Comput. J. |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Ni Wang, Hongbo Yu, Zhongwen Guo, Hongmei Lei |
Firmware Security Verification Method of Distance Learning Terminal Based on MD5 Algorithm. |
eLEOT (2) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Loganaden Velvindron, Kathleen Moriarty, Alessandro Ghedini |
Deprecating MD5 and SHA-1 Signature Hashes in TLS 1.2 and DTLS 1.2. |
RFC |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Ammar Mohammed Ali, Alaa Kadhim Farhan |
A Novel Improvement With an Effective Expansion to Enhance the MD5 Hash Function for Verification of a Secure E-Document. |
IEEE Access |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Dwiki Jatikusumo, Ida Nurhaida |
Data Securing of Patients in Cloud Computing Using A Combination of SHA256 and MD5. |
APIT |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Wen-Chung Kuo, Wan-Hsuan Kao, Chun-Cheng Wang, Yu-Chih Huang |
3D-Playfair Encrypted Message Verification Technology based on MD5. |
AsiaJCIS |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Aqeel-ur Rehman, Di Xiao 0001, Ayesha Kulsoom, Muntazim Abbas Hashmi, Syed Ali Abbas |
Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules. |
Multim. Tools Appl. |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Yuying Li, Xiaohan Helu, Mohan Li, Yanbin Sun, Le Wang 0008 |
Implementation of MD5 Collision Attack in Program. |
ICAIS (1) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Larry B. de Guzman, Ariel M. Sison, Ruji P. Medina |
Implementation of Enhanced MD5 Algorithm using SSL to Ensure Data Integrity. |
ICMLSC |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Zeyad A. Al-Odat, Samee Khan |
The Sponge Structure Modulation Application to Overcome the Security Breaches for the MD5 and SHA-1 Hash Functions. |
COMPSAC (1) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Yanhong Lin, Shiguo Huang, Minglin Hong, Shiting Chen, Xiaolin Li, Dakun Lin |
MD5 Encryption Algorithm Enhanced Competitive Swarm Optimizer for Feature Selection. |
ISPA/BDCloud/SocialCom/SustainCom |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Viraj Khatri, Vanita Agarwal |
Modified MD5 algorithm for low end IoT Edge devices. |
ICCCNT |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Aman Shakya, Nitesh Karna |
Enhancing MD5 hash algorithm using symmetric key encryption. |
ICCSP |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Tushaar Gangavarapu, C. D. Jaidhar |
An Empirical Study to Detect the Collision Rate in Similarity Hashing Algorithm Using MD5. |
ICDSE |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Maruthi Gillela, Vaclav Prenosil, Venkat Reddy Ginjala |
Parallelization of Brute-Force Attack on MD5 Hash Algorithm on FPGA. |
VLSID |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Wibisono Sukmo Wardhono, Nurizal Dwi Priandani, Mahardeka Tri Ananta, Komang Candra Brata, Herman Tolle |
End-to-End Privacy Protection for Facebook Mobile Chat based on AES with Multi-Layered MD5. |
Int. J. Interact. Mob. Technol. |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Esmael Verano Maliberan, Ariel M. Sison, Ruji P. Medina |
A New Approach in Expanding the Hash Size of MD5. |
Int. J. Commun. Networks Inf. Secur. |
2018 |
DBLP BibTeX RDF |
|
21 | Behrooz Khadem, Siavosh Abedi, Isa Sa-adatyar |
An Idea to Increase the Security of EAP-MD5 Protocol Against Dictionary Attack. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
21 | C. Sathya, S. Agilan, A. G. Aruna |
Enhancing Byzantine fault tolerance using MD5 checksum and delay variation in Cloud services. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
21 | Florence Jean B. Talirongan, Ariel M. Sison, Ruji P. Medina |
An MD5-Hirose Hashing Algorithm for Digital Image Watermarking. |
ICIT |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Asmin Bhandari, Moshiur Bhuiyan, P. W. C. Prasad |
Enhancement of MD5 Algorithm for Secured Web Development. |
J. Softw. |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Alavi Kunhu, Hussain Al-Ahmad, Fatma Taher |
Medical images protection and authentication using hybrid DWT-DCT and SHA256-MD5 hash functions. |
ICECS |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Marek Sýs, Dusan Klinec, Karel Kubicek 0001, Petr Svenda |
BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256. |
ICETE (Selected Papers) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Gary C. Kessler |
The Impact of MD5 File Hash Collisions On Digital Forensic Imaging. |
J. Digit. Forensics Secur. Law |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Rakesh Kumar, Geetu Mahajan |
A novel framework for secure file transmission using modified AES and MD5 algorithms. |
Int. J. Inf. Comput. Secur. |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Anton A. Kuznetsov |
An algorithm for MD5 single-block collision attack using high-performance computing cluster. |
IACR Cryptol. ePrint Arch. |
2014 |
DBLP BibTeX RDF |
|
21 | Renjie Chen 0003, Yu Zhang 0095, Jianzhong Zhang 0003, Jingdong Xu |
Design and Optimizations of the MD5 Crypt Cracking Algorithm Based on CUDA. |
CloudComp |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Tao Xie, Fanbao Liu, Dengguo Feng |
Fast Collision Attack on MD5. |
IACR Cryptol. ePrint Arch. |
2013 |
DBLP BibTeX RDF |
|
21 | Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn, Christian Winnerlein |
BLAKE2: simpler, smaller, fast as MD5. |
IACR Cryptol. ePrint Arch. |
2013 |
DBLP BibTeX RDF |
|
21 | Wei Li 0013, Zhi Tao, Dawu Gu, Yi Wang, Zhiqiang Liu 0001, Ya Liu 0001 |
Differential Fault Analysis on the MD5 Compression Function. |
J. Comput. |
2013 |
DBLP BibTeX RDF |
|
21 | Eko Sediyono, Kartika Imam Santoso, Suhartono |
Secure login by using One-time Password authentication based on MD5 Hash encrypted SMS. |
ICACCI |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Yu Sasaki, Wataru Komatsubara, Yasuhide Sakai, Lei Wang 0031, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta |
Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL. |
SECRYPT |
2013 |
DBLP BibTeX RDF |
|
21 | Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire |
A New Encryption Cipher for Securing Digital Images of Video Surveillance Devices Using Diffie-Hellman-MD5 Algorithm and RGB Pixel Shuffling. |
EMS |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Yanjun Jiang, Mingshan Lei |
MD5 Calculation and Decryption Using CUDA on GPU. |
ISCTCS |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn, Christian Winnerlein |
BLAKE2: Simpler, Smaller, Fast as MD5. |
ACNS |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Marc Stevens 0001, Arjen K. Lenstra, Benne de Weger |
Chosen-prefix collisions for MD5 and applications. |
Int. J. Appl. Cryptogr. |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Guodong Liu, Zhihua Li, Yuefeng Lin, Bino John |
Automated family-based naming of small RNAs for next generation sequencing data using a modified MD5-digest algorithm |
CoRR |
2012 |
DBLP BibTeX RDF |
|
21 | Marc Stevens 0001 |
Single-block collision attack on MD5. |
IACR Cryptol. ePrint Arch. |
2012 |
DBLP BibTeX RDF |
|
21 | Nunzio Cassavia, Elio Masciari |
Efficient MD5 hash reversing using D.E.A. framework for sharing computational resources. |
IDEAS |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Ji-Rui Li, Su-Qing Zhang |
Online Shopping System Based on Improved MD5. |
ICICA (1) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Fanbao Liu, Tao Xie |
How to Break EAP-MD5. |
WISTP |
2012 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 249 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ >>] |
|