Improved MD5 through the extension of 1024 Message Input Block
暂无分享,去创建一个
[1] Muhammad Salman,et al. Analysis and comparison of MD5 and SHA-1 algorithm implementation in Simple-O authentication based security system , 2013, 2013 International Conference on QiR.
[2] J. Aparna,et al. Image watermarking scheme based on MD5 and simplified DES , 2014, 2014 First International Conference on Computational Systems and Communications (ICCSC).
[3] Jidong Jin,et al. Research for the application and safety of MD5 algorithm in password authentication , 2012, 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery.
[4] Meng-jiao Wang,et al. Hash Function with Variable Output Length , 2015, 2015 International Conference on Network and Information Systems for Computers.
[5] Wanggen Wan,et al. Javaweb login authentication based on improved MD5 algorithm , 2016, 2016 International Conference on Audio, Language and Image Processing (ICALIP).
[6] Eko Sediyono,et al. Secure login by using One-time Password authentication based on MD5 Hash encrypted SMS , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[7] Ary Setijadi Prihatmanto,et al. HASH MD5 function implementation at 8-bit microcontroller , 2013, 2013 Joint International Conference on Rural Information & Communication Technology and Electric-Vehicle Technology (rICT & ICeV-T).
[8] Dhananjay Kumar,et al. Rainbow table to crack password using MD5 hashing algorithm , 2013, 2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES.
[9] Bingru Yang,et al. Design and implementation for MD5-based data integrity checking system , 2010, 2010 2nd IEEE International Conference on Information Management and Engineering.
[10] Adam Ziebinski,et al. Hardware implementation of the MD5 algorithm , 2009, PDeS.
[11] Yueming Lu,et al. A method based on MD5 and time for preventing deception in electronic commerce , 2014 .
[12] H. Mirvaziri,et al. A new Hash Function Based on Combination of Existing Digest Algorithms , 2007, 2007 5th Student Conference on Research and Development.
[13] Priyanka Ora,et al. Data security and integrity in cloud computing based on RSA partial homomorphic and MD5 cryptography , 2015, 2015 International Conference on Computer, Communication and Control (IC4).
[14] Xiaowen Zhang,et al. Finding partial hash collisions by brute force parallel programming , 2017, LISAT 2017.
[15] Mitsugu Iwamoto,et al. Meet-in-the-middle preimage attacks revisited new results on MD5 and HAVAL , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[16] M.D.A. Chawdhury,et al. Security enhancement of MD5 hashed passwords by using the unused bits of TCP header , 2008, 2008 11th International Conference on Computer and Information Technology.
[17] Subhabrata Mukherjee,et al. An Efficient Cryptographic Hash Algorithm (BSA) , 2012, ArXiv.
[18] Joseph Sterling Grah. Hash functions in Cryptography , 2008 .
[19] Hu Ming,et al. MD5-Based Error Detection , 2009, 2009 Pacific-Asia Conference on Circuits, Communications and Systems.
[20] Benjamin Grégoire,et al. Verified Security of Merkle-Damgård , 2012, 2012 IEEE 25th Computer Security Foundations Symposium.
[21] Zhenqi Wang,et al. Implementation and Comparison of Two Hash Algorithms , 2013, 2013 International Conference on Computational and Information Sciences.
[22] Xie Nan-bin,et al. The Mixed Encryption Algorithm Based on MD5 and XOR Transformation , 2010, 2010 Second International Workshop on Education Technology and Computer Science.
[23] A. K. Dubey,et al. Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment , 2012, 2012 CSI Sixth International Conference on Software Engineering (CONSEG).
[24] Piyush Gupta,et al. A Comparative Analysis of SHA and MD 5 Algorithm , 2014 .
[25] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[26] Bhale Pradeepkumar Gajendra,et al. Achieving cloud security using third party auditor, MD5 and identity-based encryption , 2016, 2016 International Conference on Computing, Communication and Automation (ICCCA).
[27] Keonwoo Kim,et al. Efficient implementation of MD5 algorithm in password recovery of a PDF file , 2012, 2012 7th International Conference on Computing and Convergence Technology (ICCCT).
[28] Nabil A. Ismail,et al. An efficient message digest algorithm (MD) for data security , 2001, Proceedings of IEEE Region 10 International Conference on Electrical and Electronic Technology. TENCON 2001 (Cat. No.01CH37239).