Academic literature on the topic 'MD5'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'MD5.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "MD5"
Bowo, Prasetyo, Sumarmi Sumarmi, and Sri Hardiatmi. "PENERAPAN MACAM DAN DOSIS PUPUK ORGANIK TERHADAP PERTUMBUHAN DAN HASIL TANAMAN GANDUM (Triticum aestivum L.)." Innofarm:Jurnal Inovasi Pertanian 21, no. 1 (November 27, 2019): 1. http://dx.doi.org/10.33061/innofarm.v21i1.3311.
Full textSASAKI, Y., Y. NAITO, N. KUNIHIRO, and K. OHTA. "Improved Collision Attacks on MD4 and MD5." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E90-A, no. 1 (January 1, 2007): 36–47. http://dx.doi.org/10.1093/ietfec/e90-a.1.36.
Full textAlam Hossain, Md. "Cryptanalyzing of Message Digest Algorithms MD4 and MD5." International Journal on Cryptography and Information Security 2, no. 1 (March 31, 2012): 1–13. http://dx.doi.org/10.5121/ijcis.2012.2101.
Full textPandey, Vandana, and V. K Mishra. "Architecture based on MD5 and MD5-512 Bit Applications." International Journal of Computer Applications 74, no. 9 (July 26, 2013): 29–33. http://dx.doi.org/10.5120/12914-9884.
Full textFerdiansyah, Rahmat, and Paska Marto Hasugian. "Data Security System login With MD5 Algorithms in Applications deskresy.com." Journal Of Computer Networks, Architecture and High Performance Computing 2, no. 1 (January 1, 2020): 72–76. http://dx.doi.org/10.47709/cnapc.v2i1.359.
Full textSOUTHGATE, V. R., L. A. TCHUEM TCHUENTÉ, A. THÉRON, J. JOURDANE, A. LY, C. B. MONCRIEFF, and B. GRYSEELS. "Compatibility of Schistosoma mansoni Cameroon and Biomphalaria pfeifferi Senegal." Parasitology 121, no. 5 (November 2000): 501–5. http://dx.doi.org/10.1017/s0031182099006708.
Full textSASAKI, Yu, Gaoli WANG, and Lei WANG. "Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E98.A, no. 1 (2015): 26–38. http://dx.doi.org/10.1587/transfun.e98.a.26.
Full textБогачкова, И. А., О. С. Заикин, С. Е. Кочемазов, И. В. Отпущенников, А. А. Семенов, and О. О. Хамисов. "Problems of search for collisions of cryptographic hash functions of the MD family as variants of Boolean satisfiability problem." Numerical Methods and Programming (Vychislitel'nye Metody i Programmirovanie), no. 1 (April 2, 2015): 61–77. http://dx.doi.org/10.26089/nummet.v16r107.
Full textForte, Dario. "The death of MD5." Network Security 2009, no. 2 (February 2009): 18–20. http://dx.doi.org/10.1016/s1353-4858(09)70020-0.
Full textTouch, Joseph D. "Performance analysis of MD5." ACM SIGCOMM Computer Communication Review 25, no. 4 (October 1995): 77–86. http://dx.doi.org/10.1145/217391.217414.
Full textDissertations / Theses on the topic "MD5"
Sridharan, Prathap. "A survey of the attack on MD5." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3689.
Full textThesis research directed by: Applied Mathematics and Scientific Computation Program. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Legendre, Florian. "Exploitation de la logique propositionnelle pour la résolution parallèle des problèmes cryptographiques." Thesis, Reims, 2014. http://www.theses.fr/2014REIMS006/document.
Full textDemocratization of increasingly high-Performance digital technologies and especially the Internet has considerably changed the world of communication. Consequently, needs in cryptography are more and more numerous and the necessity of verifying the security of cipher algorithms is essential.This thesis deals with a new cryptanalysis, called logical cryptanalysis, which is based on the use of logical formalism to express and solve cryptographic problems. More precisely, works presented here focuses on a particular category of ciphers, called cryptographic hash functions, used in authentication and data integrity protocols.Logical cryptanalysis is a specific algebraic cryptanalysis where the expression of the cryptographic problem is done through the satisfiabilty problem, fluently called sat problem. It consists in a combinatorial problem of decision which is central in complexity theory. In the past years, works led by the scientific community have allowed to develop efficient solvers for industrial and academical problems.Works presented in this thesis are the fruit of an exploration between satisfiability and cryptanalysis, and have enabled to display new results and innovative methods to weaken cryptographic functions.The first contribution is the modeling of a cryptographic problem as a sat problem. For this, we present some rules that lead to describe easily basic operations involved in cipher algorithms. Then, a section is dedicated to logical reasoning in order to simplify the produced sat formulas and show how satisfiability can help to enrich a knowledge on a studied problem. Furthermore, we also present many points of view to use our smooth modeling to apply a probabilistic reasoning on all the data associated with the generated sat formulas. This has then allowed to improve both the modeling and the solving of the problem and underlined a weakness about the use of round constants.Second, a section is devoted to practical attacks. Within this framework, we tackled preimages of the most popular cryptographic hash functions. Moreover, the collision problem is also approached in different ways, and particularly, the one-Bloc collision attack of Stevens on MD5 was translated within a logical context. It's interesting to remark that in both cases, logical cryptanalysis takes a new look on the considered problems
Ващенко, К. А. "Розробка комп’ютерної системи конфіденційної передачі повідомлень." Thesis, Чернігів, 2020. http://ir.stu.cn.ua/123456789/23440.
Full textОб’єктом розробки дипломної роботи є комп’ютерна система конфіденційної передачі повідомлень, що включає в себе бібліотеку класів для розробки додатку та сервер, на якому зберігається потрібна інформація для шифрування та для знаходження користувачів один одними. Серверна частина розробляється на мові java й буде запускатися на ОС Windows, бібліотека для роботи з сервером також написана на java і її можна використовувати як і на мобільному пристрої, так і на комп’ютері. В проекті використовуються бібліотеки Gson, postgresql та популярні технології безбечної передачі інформації RSA-шифрування і digest-авторизація. Ціллю проведеної роботи – розробити сервер, який буде зберігати важливу інформацію про користувача, включаючи публічний ключ шифрування, який знадобиться для спілкування між кінцевими пристроями. Розподілити дані, що зберігає сервер, на тимчасові та постійні. Вибрати зручну базу данних (БД) для зберігання постійних данних. Зробити безпечне збереження паролів користувача в БД, щоб зловмисник, який отримає доступ до БД, не міг узнати чужих паролів та видати себе за іншого користувача. Надати зручний спосіб для роботи з сервером у вигляді бібліотеки. Поставлені наступні основні задачі: - Вибір популярної та зручної мови програмування; - Знайомство з принципами шифрування, безпечного зберігання конфіденційної інформації, знайомство з роботою з базою даних; - Налаштувати зручну БД; - Реалізувати проект; В ході виконання роботи були розроблені : - Сервер; - БД; - Бібліотека для звернення до серверу.
The object of thesis development is a computer system for safe message transfer that includes a library of classes for app development and server that contains useful user information for encrypting messages and for finding each other. The server part is being developed in java language and will be launching in Windows OS, library for working with server is written in java too and programmer can use this library for developing computer app and mobile app too. Project uses Gson, postgres libraries and popular technologies for safe information transfer: RSA-encrypting and digest-authorization. The purpose of this work is to develop a server, which will save important information about user, inculding public key for encrypting too that will be used by end-to-end peers. To part data, that server saves, on terminal and persistant. To make safe saving of user passwords in database(DB), because of malefactor who can get access to database and then he can to pretend to be other man. To deliver convinient interface for working with server. The following main tasks are set: Choosing the popular and convinient programming language ; Familiarity with the encrypting theory and principles, with ways of saving confidential information safe, perusing theory for working with DB using chosen programming language; Configuring DB; Writing project; In the course of the work were developed : Server; Database; Library for requesting a server;
Hajný, Jan. "Návrh řešení autentizace uživatelů pro malé a střední počítačové sítě." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217309.
Full textPiller, Igor. "Hashovací funkce a jejich využití při autentizaci." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218115.
Full textHadjichristofi, George Costa. "IPSec Overhead in Wireline and Wireless Networks for Web and Email Applications." Thesis, Virginia Tech, 2001. http://hdl.handle.net/10919/35710.
Full textMaster of Science
Trusz, Jakob. "Content Management Systems and MD5: Investigating Alternative Methods of Version Identification for Open Source Projects." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14821.
Full textLokby, Patrik, and Manfred Jönsson. "Preventing SQL Injections by Hashing the Query Parameter Data." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14922.
Full textKarlsson, Marcus, and Oscar Zaja. "Improving Security In Embedded Systems With IEEE 802.1X." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-53322.
Full textDahlin, Karl. "Hashing algorithms : A comparison for blockchains in Internet of things." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-34057.
Full textBooks on the topic "MD5"
chos/, 1931 'jam dbyangs dam. rang gi mi tshe'i byung ba mdo tsam brjod pa drang srong rgan po'i srang mda'. Lan kru'u: Kan su'u mi rigs dpe skrun khang, 2015.
Find full textMassachusetts. Metropolitan District Commission. Division of Parks and Recreation. MDC bikepaths. Boston: MDC, Division of Parks and Recreation, 1986.
Find full textMontana. Dept. of Transportation. Public Affairs Bureau. The MDT interchange. Helena: Public Affairs Bureau, Montana Dept. of Transportation, 1991.
Find full textAaron, Mnguni, ed. Imidlalo kaZakes Mda. Pitori: Yunivesithi yeSewula Afrika, 2003.
Find full textHopp, Julia. The MDS troubleshooter. 2nd ed. Marblehead, MA: Opus Communications, 2002.
Find full textGreat Britain. Central Office of Information. M25 orbital motorway. London: Department of Transport, 1986.
Find full textBook chapters on the topic "MD5"
Mouha, Nicky. "MD4-MD5." In Encyclopedia of Cryptography and Security, 768–71. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_595.
Full textWang, Xiaoyun, Hongbo Yu, Wei Wang, Haina Zhang, and Tao Zhan. "Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC." In Advances in Cryptology - EUROCRYPT 2009, 121–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01001-9_7.
Full textSasaki, Yu. "Collisions of MMO-MD5 and Their Impact on Original MD5." In Lecture Notes in Computer Science, 117–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21969-6_8.
Full textLiu, Fanbao, and Tao Xie. "How to Break EAP-MD5." In Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 49–57. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30955-7_6.
Full textAumasson, Jean-Philippe, Samuel Neves, Zooko Wilcox-O’Hearn, and Christian Winnerlein. "BLAKE2: Simpler, Smaller, Fast as MD5." In Applied Cryptography and Network Security, 119–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38980-1_8.
Full textSasaki, Yu, and Kazumaro Aoki. "Preimage Attacks on Step-Reduced MD5." In Information Security and Privacy, 282–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-70500-0_21.
Full textKim, Jongsung, Alex Biryukov, Bart Preneel, and Sangjin Lee. "On the Security of Encryption Modes of MD4, MD5 and HAVAL." In Information and Communications Security, 147–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11602897_13.
Full textAoki, Kazumaro, and Yu Sasaki. "Preimage Attacks on One-Block MD4, 63-Step MD5 and More." In Selected Areas in Cryptography, 103–19. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04159-4_7.
Full textSasaki, Yu, and Lei Wang. "Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5." In Selected Areas in Cryptography -- SAC 2013, 493–512. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43414-7_25.
Full textden Boer, Bert, and Antoon Bosselaers. "Collisions for the compression function of MD5." In Advances in Cryptology — EUROCRYPT ’93, 293–304. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-48285-7_26.
Full textConference papers on the topic "MD5"
Yong-Xia, Zhao, and Zhen Ge. "MD5 Research." In 2010 Second International Conference on Multimedia and Information Technology. IEEE, 2010. http://dx.doi.org/10.1109/mmit.2010.186.
Full textTouch, Joseph D. "Performance analysis of MD5." In the conference. New York, New York, USA: ACM Press, 1995. http://dx.doi.org/10.1145/217382.217414.
Full textMing, Hu, and Wang Yan. "MD5-Based Error Detection." In 2009 Pacific-Asia Conference on Circuits, Communications and Systems (PACCS). IEEE, 2009. http://dx.doi.org/10.1109/paccs.2009.147.
Full textLibed, Jake M., Ariel M. Sison, and Rujie P. Medina. "Enhancing MD5 Collision Susceptibility." In ICIBE' 18: 2018 4th International Conference on Industrial and Business Engineering. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3288155.3288173.
Full textOm Kumar, C. U., S. Kishore, and A. Geetha. "Debugging using MD5 process firewall." In 2014 International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2014. http://dx.doi.org/10.1109/ic3i.2014.7019657.
Full textde Guzman, Larry B., Ariel M. Sison, and Ruji P. Medina. "MD5 Secured Cryptographic Hash Value." In the 2018 International Conference. New York, New York, USA: ACM Press, 2018. http://dx.doi.org/10.1145/3278312.3278317.
Full textLiao, Hancheng. "Image Retrieval Based on MD5." In 2008 International Conference on Advanced Computer Theory and Engineering (ICACTE). IEEE, 2008. http://dx.doi.org/10.1109/icacte.2008.76.
Full textYu, Wang, Chen Jianhua, and He Debiao. "A New Collision Attack on MD5." In 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC). IEEE, 2009. http://dx.doi.org/10.1109/nswctc.2009.264.
Full textLandge, Irfan A., and Hannan Satopay. "Secured IoT Through Hashing Using MD5." In 2018 Fourth International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB). IEEE, 2018. http://dx.doi.org/10.1109/aeeicb.2018.8481007.
Full textAfre, Ashwini S., Manisha Bharati, and Sharvaree Tamane. "DeyPos: For multi-users environments using MD5." In 2017 1st International Conference on Intelligent Systems and Information Management (ICISIM). IEEE, 2017. http://dx.doi.org/10.1109/icisim.2017.8122181.
Full textReports on the topic "MD5"
Touch, J. Report on MD5 Performance. RFC Editor, June 1995. http://dx.doi.org/10.17487/rfc1810.
Full textBaker, F., and R. Atkinson. RIP-2 MD5 Authentication. RFC Editor, January 1997. http://dx.doi.org/10.17487/rfc2082.
Full textTurner, S., and L. Chen. Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms. RFC Editor, March 2011. http://dx.doi.org/10.17487/rfc6151.
Full textMelnikov, A. Moving DIGEST-MD5 to Historic. RFC Editor, July 2011. http://dx.doi.org/10.17487/rfc6331.
Full textMetzger, P., and W. Simpson. IP Authentication using Keyed MD5. RFC Editor, August 1995. http://dx.doi.org/10.17487/rfc1828.
Full textMyers, J., and M. Rose. The Content-MD5 Header Field. RFC Editor, October 1995. http://dx.doi.org/10.17487/rfc1864.
Full textRivest, R. The MD5 Message-Digest Algorithm. RFC Editor, April 1992. http://dx.doi.org/10.17487/rfc1321.
Full textRose, M. The Content-MD5 Header Field. RFC Editor, November 1993. http://dx.doi.org/10.17487/rfc1544.
Full textBellovin, S. Key Change Strategies for TCP-MD5. RFC Editor, March 2007. http://dx.doi.org/10.17487/rfc4808.
Full textOehler, M., and R. Glenn. HMAC-MD5 IP Authentication with Replay Prevention. RFC Editor, February 1997. http://dx.doi.org/10.17487/rfc2085.
Full text