The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for MD5 with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1992-1996 (15) 1997-2000 (17) 2001-2004 (23) 2005 (28) 2006 (29) 2007 (27) 2008 (31) 2009 (17) 2010-2012 (20) 2013-2017 (17) 2018-2020 (17) 2021-2024 (8)
Publication types (Num. hits)
article(83) incollection(5) inproceedings(161)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 207 occurrences of 117 keywords

Results
Found 249 publication records. Showing 249 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
125Yu Sasaki, Kazumaro Aoki Finding Preimages in Full MD5 Faster Than Exhaustive Search. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF splice-and-cut, hash function, MD5, preimage, one-way, local collision
125Yu Sasaki, Kazumaro Aoki Preimage Attacks on Step-Reduced MD5. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Message Expansion, Hash Function, MD5, Preimage Attack, One-Way, Local Collision
120Xiaoyun Wang 0001, Hongbo Yu, Wei Wang 0035, Haina Zhang, Tao Zhan Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MDx-MAC, Distinguishing attack, MD5, Key recovery, HMAC, NMAC
102Joseph D. Touch Performance Analysis of MD5. Search on Bibsonomy SIGCOMM The full citation details ... 1995 DBLP  DOI  BibTeX  RDF Internet
98Marc Stevens 0001, Alexander Sotirov, Jacob Appelbaum, Arjen K. Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF PlayStation 3, certificate, collision attack, MD5
98Jie Liang, Xuejia Lai Improved Collision Attack on Hash Function MD5. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash function, collision, MD5, differential attack
89Marc Stevens 0001, Arjen K. Lenstra, Benne de Weger Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
89Kimmo U. Järvinen, Matti Tommiska, Jorma Skyttä Hardware Implementation Analysis of the MD5 Hash Algorithm. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
85Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF MD5, key-recovery, HMAC, differential attack, MD4, NMAC, near-collision
85Michael Szydlo, Yiqun Lisa Yin Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF signature, MD5, SHA-1, padding, hash collision
85Markku-Juhani Olavi Saarinen Cryptanalysis of Block Ciphers Based on SHA-1 and MD5. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF SHACAL, Dedicated hash functions, MDC, MD5, SHA-1, Slide attacks
75John Black, Martin Cochran, Trevor Highland A Study of the MD5 Attacks: Insights and Improvements. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
75Bert den Boer, Antoon Bosselaers Collisions for the Compressin Function of MD5. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
71Florian Mendel, Christian Rechberger, Martin Schläffer MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, combiner, differential, MD5
71Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF collisions, MD5, key-recovery, HMAC, MD4, NMAC, differential path
64Yu Sasaki, Gaoli Wang, Lei Wang 0031 Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
62Shiwei Chen, Chenhui Jin An Improved Collision Attack on MD5 Algorithm. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
62Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
62Xiaoyun Wang 0001, Hongbo Yu How to Break MD5 and Other Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
58Jirí Vábek, Daniel Joscák, Milan Bohácek, Jirí Tuma A New Type of 2-Block Collisions in MD5. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Stevens algorithm, collisions, MD5, differential paths
58Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF APOP, Challenge and Response, Password Recovery, Message Difference, Hash Function, Collision Attack, MD5
48Anh Tuan Hoang, Katsuhiro Yamazaki, Shigeru Oyanagi Multi-stage Pipelining MD5 Implementations on FPGA with Data Forwarding. Search on Bibsonomy FCCM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
48Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee 0002 On the Security of Encryption Modes of MD4, MD5 and HAVAL. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
48Mao-Yin Wang, Chih-Pin Su, Chih-Tsun Huang, Cheng-Wen Wu An HMAC processor with integrated SHA-1 and MD5 algorithms. Search on Bibsonomy ASP-DAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
48Il-Gon Kim, Jin-Young Choi Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
48Thomas A. Berson Differential Cryptanalysis Mod 2^32 with Applications to MD5. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
46Hans Dobbertin Cryptanalysis of MD4. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Dedicated hash functions, RIPEMD, Dedicated hash functions, RIPEMD, Collisions, Collisions, Key words, MD5, MD5, MD4, MD4
44Gaëtan Leurent Message Freedom in MD4 and MD5 Collisions: Application to APOP. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF message modification, meaningful collisions, APOP security, Hash function, MD5, MD4
43Yu Sasaki, Lei Wang 0031 Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
43Sean Turner, Lily Chen Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms. Search on Bibsonomy RFC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
43Yu Sasaki Collisions of MMO-MD5 and Their Impact on Original MD5. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
40Naomi Fujimura, Jin Mei Implementation of file interpolation detection system. Search on Bibsonomy SIGUCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF file interpolation, security, management, web server
36Lei Wang 0031, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta Bit-Free Collision: Application to APOP Attack. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF bit-free collision, APOP, hash function, MD5, MD4
36Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede Design Methodology for Throughput Optimum Architectures of Hash Algorithms of the MD4-class. Search on Bibsonomy J. Signal Process. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Architecture design methodology, MD4-based hash algorithm, SHA1, RIPEMD-160, Iteration bound analysis, DFG (Data Flow Graph) transformation, Throughput optimization, MD5
36Xunhua Wang, Yih Huang, Yvo Desmedt, David Rine Enabling Secure On-Line DNS Dynamic Update. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF secure online DNS dynamic update, Internet Engineering Task Force, DNS Security Extension, zone security key, role separation principle, signature computation time, Internet, authentication, cryptography, distributed databases, RSA, transport protocols, experimental results, message authentication, threshold cryptography, telecommunication security, MD5, Domain Name System, IP addresses, performance penalty, DNSSEC
35Chen-Hsing Wang, Chih-Yen Lo, Min-Sheng Lee, Jen-Chieh Yeh, Chih-Tsun Huang, Cheng-Wen Wu, Shi-Yu Huang A network security processor design based on an integrated SOC design and test platform. Search on Bibsonomy DAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF HMAC-MD5, HMAC-SHA1, AES, RSA, AMBA, RNG
35 Message Digest (MD5) Algorithm and Secure Hash Algorithm (SHA). Search on Bibsonomy Encyclopedia of Multimedia The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Akashi Satoh, Tadanobu Inoue ASIC-Hardware-Focused Comparison for Hash Functions MD5, RIPEMD-160, and SHS. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Bart Preneel The State of Hash Functions and the NIST SHA-3 Competition. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Deepak Sreedharan, Ali Akoglu A hybrid processing element based reconfigurable architecture for hashing algorithms. Search on Bibsonomy IPDPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Christian Rechberger, Vincent Rijmen On Authentication with HMAC and Non-random Properties. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Hyung-Woo Lee Secure Authentication and Accounting Mechanism on WLAN with Interaction of Mobile Message Service. Search on Bibsonomy HCI (6) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Ahto Buldas, Sven Laur Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Daniel Joscák, Jirí Tuma Multi-block Collisions in Hash Functions Based on 3C and 3C+ Enhancements of the Merkle-Damgård Construction. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multi-block collision attack, 3C and 3C+ constructions, hash functions
27Yu Sasaki, Yusuke Naito 0001, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta How to Construct Sufficient Conditions for Hash Functions. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Chang-Chun Cheng, Wei-Ming Chen, Han-Chieh Chao, Yao-Po Wang FPGA Authentication Header (AH) Implementation for Internet Appliances. Search on Bibsonomy PRDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Jin Zhi, Chung-Horng Lung, Xia Xu, Anand Srinivasan, Yi Lei Securing RSVP and RSVP-TE signaling protocols and their performance study. Search on Bibsonomy ITRE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27William Aiello, Stuart Haber, Ramarathnam Venkatesan New Constructions for Secure Hash Functions. Search on Bibsonomy FSE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
27Mihir Bellare, Phillip Rogaway Collision-Resistant Hashing: Towards Making UOWHFs Practical. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
27Mihir Bellare, Roch Guérin, Phillip Rogaway XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
27Paul C. van Oorschot, Michael J. Wiener Parallel Collision Search with Application to Hash Functions and Discrete Logarithms. Search on Bibsonomy CCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
23Khidir M. Ali, Ali Al-Khlifa A Comparative Study of Authentication Methods for Wi-Fi Networks. Search on Bibsonomy CICSyN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF IEEE802.11X, LEAP, PEAP, TTLS, TLS, MD5, FAST, EAP
23Sandip Dutta, Avijit Kar, N. C. Mahanti, B. N. Chatterji Network Security Using Biometric and Cryptography. Search on Bibsonomy ACIVS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptography, Biometric, Watermarking, DES, MD5
22Jon Allen, Jeff Wilson Securing a wireless network. Search on Bibsonomy SIGUCCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF EAP-LEAP, EAP-MD5, EAP-TLS, EAP-TTLS, VPN, WEP, 802.11i, 802.1x
21Ayhan Renklier, Serkan Öztürk Image authentication and recovery: Sudoku puzzle and MD5 hash algorithm based self-embedding fragile image watermarking method. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
21Nitha C. Velayudhan, A. Anitha, Mukesh Madanan Sybil attack detection and secure data transmission in VANET using CMEHA-DNN and MD5-ECC. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Hayder Al-Ghanimi, Mohammed Q. Mohammed, Malik Kareem Kadhim Alzeyadi, Tamarah Alaa Diame, Faris Hassan Taha Aldabbagh, Mustafa Altaee Detection of Attacks by Assessing the Performance of MD2, MD5 and SHA-1 Hashing Algorithms. Search on Bibsonomy IC3I The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Kavin Kumar K, Nandhini V. D, Kowsalya M, Ragu P. J, Raghapriya N. R, S. Maheswaran 0001 Designing and validating an MD5 Hash Algorithm using the UVM Verification Framework and Checkers. Search on Bibsonomy ICCCNT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Umesh Kumar, V. Ch. Venkaiah An Efficient Message Authentication Code Based on Modified MD5-384 Bits Hash Function and Quasigroup. Search on Bibsonomy Int. J. Cloud Appl. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Yanzhao Shen, Ting Wu 0001, Gaoli Wang, Xinfeng Dong, Haifeng Qian Improved Collision Detection Of MD5 Using Sufficient Condition Combination. Search on Bibsonomy Comput. J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Ni Wang, Hongbo Yu, Zhongwen Guo, Hongmei Lei Firmware Security Verification Method of Distance Learning Terminal Based on MD5 Algorithm. Search on Bibsonomy eLEOT (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Loganaden Velvindron, Kathleen Moriarty, Alessandro Ghedini Deprecating MD5 and SHA-1 Signature Hashes in TLS 1.2 and DTLS 1.2. Search on Bibsonomy RFC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Ammar Mohammed Ali, Alaa Kadhim Farhan A Novel Improvement With an Effective Expansion to Enhance the MD5 Hash Function for Verification of a Secure E-Document. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
21Dwiki Jatikusumo, Ida Nurhaida Data Securing of Patients in Cloud Computing Using A Combination of SHA256 and MD5. Search on Bibsonomy APIT The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
21Wen-Chung Kuo, Wan-Hsuan Kao, Chun-Cheng Wang, Yu-Chih Huang 3D-Playfair Encrypted Message Verification Technology based on MD5. Search on Bibsonomy AsiaJCIS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
21Aqeel-ur Rehman, Di Xiao 0001, Ayesha Kulsoom, Muntazim Abbas Hashmi, Syed Ali Abbas Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Yuying Li, Xiaohan Helu, Mohan Li, Yanbin Sun, Le Wang 0008 Implementation of MD5 Collision Attack in Program. Search on Bibsonomy ICAIS (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Larry B. de Guzman, Ariel M. Sison, Ruji P. Medina Implementation of Enhanced MD5 Algorithm using SSL to Ensure Data Integrity. Search on Bibsonomy ICMLSC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Zeyad A. Al-Odat, Samee Khan The Sponge Structure Modulation Application to Overcome the Security Breaches for the MD5 and SHA-1 Hash Functions. Search on Bibsonomy COMPSAC (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Yanhong Lin, Shiguo Huang, Minglin Hong, Shiting Chen, Xiaolin Li, Dakun Lin MD5 Encryption Algorithm Enhanced Competitive Swarm Optimizer for Feature Selection. Search on Bibsonomy ISPA/BDCloud/SocialCom/SustainCom The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Viraj Khatri, Vanita Agarwal Modified MD5 algorithm for low end IoT Edge devices. Search on Bibsonomy ICCCNT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Aman Shakya, Nitesh Karna Enhancing MD5 hash algorithm using symmetric key encryption. Search on Bibsonomy ICCSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Tushaar Gangavarapu, C. D. Jaidhar An Empirical Study to Detect the Collision Rate in Similarity Hashing Algorithm Using MD5. Search on Bibsonomy ICDSE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Maruthi Gillela, Vaclav Prenosil, Venkat Reddy Ginjala Parallelization of Brute-Force Attack on MD5 Hash Algorithm on FPGA. Search on Bibsonomy VLSID The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Wibisono Sukmo Wardhono, Nurizal Dwi Priandani, Mahardeka Tri Ananta, Komang Candra Brata, Herman Tolle End-to-End Privacy Protection for Facebook Mobile Chat based on AES with Multi-Layered MD5. Search on Bibsonomy Int. J. Interact. Mob. Technol. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Esmael Verano Maliberan, Ariel M. Sison, Ruji P. Medina A New Approach in Expanding the Hash Size of MD5. Search on Bibsonomy Int. J. Commun. Networks Inf. Secur. The full citation details ... 2018 DBLP  BibTeX  RDF
21Behrooz Khadem, Siavosh Abedi, Isa Sa-adatyar An Idea to Increase the Security of EAP-MD5 Protocol Against Dictionary Attack. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
21C. Sathya, S. Agilan, A. G. Aruna Enhancing Byzantine fault tolerance using MD5 checksum and delay variation in Cloud services. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
21Florence Jean B. Talirongan, Ariel M. Sison, Ruji P. Medina An MD5-Hirose Hashing Algorithm for Digital Image Watermarking. Search on Bibsonomy ICIT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Asmin Bhandari, Moshiur Bhuiyan, P. W. C. Prasad Enhancement of MD5 Algorithm for Secured Web Development. Search on Bibsonomy J. Softw. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Alavi Kunhu, Hussain Al-Ahmad, Fatma Taher Medical images protection and authentication using hybrid DWT-DCT and SHA256-MD5 hash functions. Search on Bibsonomy ICECS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Marek Sýs, Dusan Klinec, Karel Kubicek 0001, Petr Svenda BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256. Search on Bibsonomy ICETE (Selected Papers) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Gary C. Kessler The Impact of MD5 File Hash Collisions On Digital Forensic Imaging. Search on Bibsonomy J. Digit. Forensics Secur. Law The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Rakesh Kumar, Geetu Mahajan A novel framework for secure file transmission using modified AES and MD5 algorithms. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Anton A. Kuznetsov An algorithm for MD5 single-block collision attack using high-performance computing cluster. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
21Renjie Chen 0003, Yu Zhang 0095, Jianzhong Zhang 0003, Jingdong Xu Design and Optimizations of the MD5 Crypt Cracking Algorithm Based on CUDA. Search on Bibsonomy CloudComp The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Tao Xie, Fanbao Liu, Dengguo Feng Fast Collision Attack on MD5. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
21Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn, Christian Winnerlein BLAKE2: simpler, smaller, fast as MD5. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
21Wei Li 0013, Zhi Tao, Dawu Gu, Yi Wang, Zhiqiang Liu 0001, Ya Liu 0001 Differential Fault Analysis on the MD5 Compression Function. Search on Bibsonomy J. Comput. The full citation details ... 2013 DBLP  BibTeX  RDF
21Eko Sediyono, Kartika Imam Santoso, Suhartono Secure login by using One-time Password authentication based on MD5 Hash encrypted SMS. Search on Bibsonomy ICACCI The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Yu Sasaki, Wataru Komatsubara, Yasuhide Sakai, Lei Wang 0031, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
21Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire A New Encryption Cipher for Securing Digital Images of Video Surveillance Devices Using Diffie-Hellman-MD5 Algorithm and RGB Pixel Shuffling. Search on Bibsonomy EMS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Yanjun Jiang, Mingshan Lei MD5 Calculation and Decryption Using CUDA on GPU. Search on Bibsonomy ISCTCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn, Christian Winnerlein BLAKE2: Simpler, Smaller, Fast as MD5. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Marc Stevens 0001, Arjen K. Lenstra, Benne de Weger Chosen-prefix collisions for MD5 and applications. Search on Bibsonomy Int. J. Appl. Cryptogr. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Guodong Liu, Zhihua Li, Yuefeng Lin, Bino John Automated family-based naming of small RNAs for next generation sequencing data using a modified MD5-digest algorithm Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
21Marc Stevens 0001 Single-block collision attack on MD5. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
21Nunzio Cassavia, Elio Masciari Efficient MD5 hash reversing using D.E.A. framework for sharing computational resources. Search on Bibsonomy IDEAS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Ji-Rui Li, Su-Qing Zhang Online Shopping System Based on Improved MD5. Search on Bibsonomy ICICA (1) The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Fanbao Liu, Tao Xie How to Break EAP-MD5. Search on Bibsonomy WISTP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 249 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license