A New Approach in Expanding the Hash Size of MD5
暂无分享,去创建一个
[1] Gurpreet Singh,et al. Modified Vigenere Encryption Algorithm and Its Hybrid Implementation with Base64 and AES , 2013, 2013 2nd International Conference on Advanced Computing, Networking and Security.
[2] M. Eshghi,et al. Design of an ASIP processor for MD5 hash algorithm , 2012, 2012 20th Telecommunications Forum (TELFOR).
[3] Abhirup Khanna,et al. Cloud security ecosystem for data security and privacy , 2017, 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence.
[4] Jitendra Agrawal,et al. New Modified 256-bit MD5 Algorithm with SHA Compression Function , 2012 .
[5] T. Sasilatha,et al. Performance analysis of black hole attack detection scheme using MD5 algorithm in WSN , 2014, 2014 International Conference on Smart Structures and Systems (ICSSS).
[6] Shadi Ismail Nashwan. SE-H: A Secure and Efficient Hash Protocol for RFID System , 2017, Int. J. Commun. Networks Inf. Secur..
[7] Keonwoo Kim,et al. Efficient implementation of MD5 algorithm in password recovery of a PDF file , 2012, 2012 7th International Conference on Computing and Convergence Technology (ICCCT).
[8] P. W. C. Prasad,et al. Enhancement of MD5 Algorithm for Secured Web Development , 2017, J. Softw..
[9] Seung-Il Sonh. A Study on Area-Efficient Design of Unified MD5 and HAS-160 Hash Algorithms , 2012 .
[10] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[11] M.D.A. Chawdhury,et al. Security enhancement of MD5 hashed passwords by using the unused bits of TCP header , 2008, 2008 11th International Conference on Computer and Information Technology.
[12] Marc Stevens,et al. Chosen-prefix collisions for MD5 and applications , 2012, Int. J. Appl. Cryptogr..
[13] Vishwanath S. Mahalle,et al. Enhancing the data security in Cloud by implementing hybrid (Rsa & Aes) encryption algorithm , 2014, 2014 International Conference on Power, Automation and Communication (INPAC).
[14] Wanggen Wan,et al. Javaweb login authentication based on improved MD5 algorithm , 2016, 2016 International Conference on Audio, Language and Image Processing (ICALIP).
[15] Eko Sediyono,et al. Secure login by using One-time Password authentication based on MD5 Hash encrypted SMS , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[16] Amita Pandey,et al. A Modified Approach For Cryptograpic Hash Function Based On MD5 Algorithm , 2013 .
[17] Dhananjay Kumar,et al. Rainbow table to crack password using MD5 hashing algorithm , 2013, 2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES.
[18] Zhao Shun Wang,et al. Security Analysis of MD5 Algorithm in Password Storage , 2013 .
[19] Wang Xi-jin,et al. The Application Research of MD5 Encryption Algorithm in DCT Digital Watermarking , 2012 .
[20] Shruti Gupta,et al. Enhancement of security mechanism for confidential data using AES-128, 192 and 256bit encryption in cloud , 2015, 2015 1st International Conference on Next Generation Computing Technologies (NGCT).
[21] Sumita Tyagi,et al. A New Improved and Secure Version of MD5 , 2014 .
[22] Canqun Yang,et al. Constant memory optimizations in MD5 Crypt cracking algorithm on GPU-accelerated supercomputer using CUDA , 2012, 2012 7th International Conference on Computer Science & Education (ICCSE).
[23] S Nagarajan,et al. A Modified MD5 Algorithm for Wireless Networks , 2012 .
[24] Vandana Pandey,et al. Architecture based on MD5 and MD5-512 Bit Applications , 2013 .
[25] Jidong Jin,et al. Research for the application and safety of MD5 algorithm in password authentication , 2012, 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery.
[26] Yu Sasaki,et al. Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC , 2015 .
[27] Christof Paar,et al. Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .
[28] Zurina Mohd Hanapi,et al. A framework based on RSA and AES encryption algorithms for cloud computing services , 2014, 2014 IEEE Conference on Systems, Process and Control (ICSPC 2014).
[29] Ioannis Papaefstathiou,et al. Implementing Rainbow Tables in High-End FPGAs for Super-Fast Password Cracking , 2010, 2010 International Conference on Field Programmable Logic and Applications.