Implementation and Comparative Analysis of RSA and MD5 Algorithm
暂无分享,去创建一个
[1] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[2] Keonwoo Kim,et al. Efficient implementation of MD5 algorithm in password recovery of a PDF file , 2012, 2012 7th International Conference on Computing and Convergence Technology (ICCCT).
[3] Behrouz A. Forouzan,et al. Cryptography and network security , 1998 .
[4] Zhenqi Wang,et al. Implementation and Comparison of Two Hash Algorithms , 2013, 2013 International Conference on Computational and Information Sciences.
[5] Dan Boneh,et al. TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .
[6] William Stallings,et al. Cryptography and network security , 1998 .
[7] Kaoru Kurosawa,et al. Small Secret Key Attack on a Variant of RSA (Due to Takagi) , 2008, CT-RSA.
[8] Muhammad Salman,et al. Analysis and comparison of MD5 and SHA-1 algorithm implementation in Simple-O authentication based security system , 2013, 2013 International Conference on QiR.
[9] Dengguo Feng,et al. Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD , 2004, IACR Cryptol. ePrint Arch..
[10] Cryptosystem Dan Boneh. Twenty Years of Attacks on the RSA , 1999 .
[11] Musheer Ahmad,et al. Digital image authentication and encryption using digital signature , 2015, 2015 International Conference on Advances in Computer Engineering and Applications.
[12] Laurent Nana,et al. A New Encryption Cipher for Securing Digital Images of Video Surveillance Devices Using Diffie-Hellman-MD5 Algorithm and RGB Pixel Shuffling , 2013, 2013 European Modelling Symposium.
[13] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[14] Hu Ming,et al. The Collision Rate Tests of Two Known Message Digest Algorithms , 2009, 2009 International Conference on Computational Intelligence and Security.
[15] Aloka Sinha,et al. A technique for image encryption using digital signature , 2003 .
[16] Sattar J Aboud,et al. An efficient method for attack RSA scheme , 2009, 2009 Second International Conference on the Applications of Digital Information and Web Technologies.
[17] Zhao Yong-Xia,et al. MD5 Research , 2010, 2010 Second International Conference on Multimedia and Information Technology.
[18] Hancheng Liao. Image Retrieval Based on MD5 , 2008, 2008 International Conference on Advanced Computer Theory and Engineering.
[19] Jitendra Agrawal,et al. New Modified 256-bit MD5 Algorithm with SHA Compression Function , 2012 .