Journal articles on the topic 'MD5'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'MD5.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Bowo, Prasetyo, Sumarmi Sumarmi, and Sri Hardiatmi. "PENERAPAN MACAM DAN DOSIS PUPUK ORGANIK TERHADAP PERTUMBUHAN DAN HASIL TANAMAN GANDUM (Triticum aestivum L.)." Innofarm:Jurnal Inovasi Pertanian 21, no. 1 (November 27, 2019): 1. http://dx.doi.org/10.33061/innofarm.v21i1.3311.
Full textSASAKI, Y., Y. NAITO, N. KUNIHIRO, and K. OHTA. "Improved Collision Attacks on MD4 and MD5." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E90-A, no. 1 (January 1, 2007): 36–47. http://dx.doi.org/10.1093/ietfec/e90-a.1.36.
Full textAlam Hossain, Md. "Cryptanalyzing of Message Digest Algorithms MD4 and MD5." International Journal on Cryptography and Information Security 2, no. 1 (March 31, 2012): 1–13. http://dx.doi.org/10.5121/ijcis.2012.2101.
Full textPandey, Vandana, and V. K Mishra. "Architecture based on MD5 and MD5-512 Bit Applications." International Journal of Computer Applications 74, no. 9 (July 26, 2013): 29–33. http://dx.doi.org/10.5120/12914-9884.
Full textFerdiansyah, Rahmat, and Paska Marto Hasugian. "Data Security System login With MD5 Algorithms in Applications deskresy.com." Journal Of Computer Networks, Architecture and High Performance Computing 2, no. 1 (January 1, 2020): 72–76. http://dx.doi.org/10.47709/cnapc.v2i1.359.
Full textSOUTHGATE, V. R., L. A. TCHUEM TCHUENTÉ, A. THÉRON, J. JOURDANE, A. LY, C. B. MONCRIEFF, and B. GRYSEELS. "Compatibility of Schistosoma mansoni Cameroon and Biomphalaria pfeifferi Senegal." Parasitology 121, no. 5 (November 2000): 501–5. http://dx.doi.org/10.1017/s0031182099006708.
Full textSASAKI, Yu, Gaoli WANG, and Lei WANG. "Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E98.A, no. 1 (2015): 26–38. http://dx.doi.org/10.1587/transfun.e98.a.26.
Full textБогачкова, И. А., О. С. Заикин, С. Е. Кочемазов, И. В. Отпущенников, А. А. Семенов, and О. О. Хамисов. "Problems of search for collisions of cryptographic hash functions of the MD family as variants of Boolean satisfiability problem." Numerical Methods and Programming (Vychislitel'nye Metody i Programmirovanie), no. 1 (April 2, 2015): 61–77. http://dx.doi.org/10.26089/nummet.v16r107.
Full textForte, Dario. "The death of MD5." Network Security 2009, no. 2 (February 2009): 18–20. http://dx.doi.org/10.1016/s1353-4858(09)70020-0.
Full textTouch, Joseph D. "Performance analysis of MD5." ACM SIGCOMM Computer Communication Review 25, no. 4 (October 1995): 77–86. http://dx.doi.org/10.1145/217391.217414.
Full textGong, Wei, Yang Liu, and Lei Pan. "RETRACTED: Complexity of Generating Multi-collisions for MD4 and MD5." Physics Procedia 25 (2012): 874–78. http://dx.doi.org/10.1016/j.phpro.2012.03.171.
Full textSASAKI, Y., L. WANG, N. KUNIHIRO, and K. OHTA. "New Message Differences for Collision Attacks on MD4 and MD5." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E91-A, no. 1 (January 1, 2008): 55–63. http://dx.doi.org/10.1093/ietfec/e91-a.1.55.
Full textBarchett, Larry D., Arindam Banerji, John M. Tracey, and David L. Cohn. "Problems using MD5 with IPv6." Performance Evaluation 27-28 (October 1996): 507–18. http://dx.doi.org/10.1016/s0166-5316(96)90043-7.
Full textBarchett, L. "Problems using MD5 with IPv6." Performance Evaluation 27-28, no. 1 (October 1996): 507–18. http://dx.doi.org/10.1016/0166-5316(96)00015-6.
Full textShi, Zhi Cai, Can Qun Yang, and Qiang Wu. "Scalable MD5 Crypt Cracker on PetaScale Supercomputer." Advanced Materials Research 532-533 (June 2012): 1080–84. http://dx.doi.org/10.4028/www.scientific.net/amr.532-533.1080.
Full textPriyatna, Bayu, and April Lia Hananto. "Password Data Authentication Using a Combination of MD5 and Playfair Cipher Matrix 13x13." Buana Information Technology and Computer Sciences (BIT and CS) 1, no. 2 (July 10, 2020): 33–36. http://dx.doi.org/10.36805/bit-cs.v1i2.980.
Full textGong, Wei, Yang Liu, and Lei Pan. "Retraction notice to “Complexity of Generating Multi-collisions for MD4 and MD5”." Physics Procedia 25 (2012): 2324. http://dx.doi.org/10.1016/j.phpro.2013.05.032.
Full textWang, Lei, Yan Yan Yu, Qian Huang, Jun Yang, and Zheng Peng Zhao. "The Design and Implementation of the MD5 Algorithm Based on FPGA." Applied Mechanics and Materials 427-429 (September 2013): 806–9. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.806.
Full textAh Kioon, Mary Cindy, Zhao Shun Wang, and Shubra Deb Das. "Security Analysis of MD5 Algorithm in Password Storage." Applied Mechanics and Materials 347-350 (August 2013): 2706–11. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2706.
Full textPamula, D., and A. Ziebinski. "Hardware implementation of the MD5 algorithm." IFAC Proceedings Volumes 42, no. 1 (2009): 45–50. http://dx.doi.org/10.3182/20090210-3-cz-4002.00012.
Full textZHANG, SHao-lan, Guo-bo XING, and Yi-xian YANG. "Improvement and security analysis on MD5." Journal of Computer Applications 29, no. 4 (May 6, 2009): 947–49. http://dx.doi.org/10.3724/sp.j.1087.2009.00947.
Full textKuznetsov, Anton. "Parallel algorithm for MD5 collision attack." Program Systems: Theory and Applications 6, no. 3 (2015): 61–72. http://dx.doi.org/10.25209/2079-3316-2015-6-3-61-72.
Full textAyesh, Mr Shady, and Dr Mohammed Dweib. "SMA CRYPTOGRAPHY ALGORITHM DECRYPT MD5 SOLUTION." International Journal of Advanced Research 4, no. 11 (November 30, 2016): 290–96. http://dx.doi.org/10.21474/ijar01/2081.
Full textTian, Ye, Kun Zhang, Pu Wang, Yuming Zhang, and Jun Yang. "Add "Salt" MD5 Algorithm’s FPGA Implementation." Procedia Computer Science 131 (2018): 255–60. http://dx.doi.org/10.1016/j.procs.2018.04.211.
Full textSharma, Arvind K., and S. K. Mittal. "Cryptographic Merkle-Damgard Hash Construction: MD5 Vulnerabilities." Journal of Computational and Theoretical Nanoscience 17, no. 6 (June 1, 2020): 2435–40. http://dx.doi.org/10.1166/jctn.2020.8913.
Full textBahri, Zaiful, Joko Risanto, and Evfi Mahdiyah. "Desain Aplikasi Algoritma MD5 (Message Digest 5) Pada Media SMS Berbasis Android Mobile." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 8, no. 2 (November 16, 2017): 91–103. http://dx.doi.org/10.31849/digitalzone.v8i2.633.
Full textVazquez-Medina, Ruben, Gonzalo Duchen Sanchez, and Paola Lucia Tellez Ballesteros. "Implementing First Round of MD5 in FPGA." Telecommunications and Radio Engineering 56, no. 1 (2001): 12. http://dx.doi.org/10.1615/telecomradeng.v56.i1.100.
Full textStevens, Marc, Arjen K. Lenstra, and Benne De Weger. "Chosen-prefix collisions for MD5 and applications." International Journal of Applied Cryptography 2, no. 4 (2012): 322. http://dx.doi.org/10.1504/ijact.2012.048084.
Full textLiang, Jie, and Xue-Jia Lai. "Improved Collision Attack on Hash Function MD5." Journal of Computer Science and Technology 22, no. 1 (January 2007): 79–87. http://dx.doi.org/10.1007/s11390-007-9010-1.
Full textLi, Zhi Chao, Jie Tao Diao, Qi You Xie, Jian Bin Liu, and Ce Zhu. "Design and Implementation of OTP Base on MD5." Applied Mechanics and Materials 644-650 (September 2014): 2433–37. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2433.
Full textFang, Linan, Ting Wu, Yongxing Qi, Yanzhao Shen, Peng Zhang, Mingmin Lin, and Xinfeng Dong. "Improved collision detection of MD5 with additional sufficient conditions." Electronic Research Archive 30, no. 6 (2022): 2018–32. http://dx.doi.org/10.3934/era.2022102.
Full textLiu, Yu. "Dynamic Encryption Lock Used for Matching Random Signals by Algorithm Program." Advanced Materials Research 798-799 (September 2013): 745–48. http://dx.doi.org/10.4028/www.scientific.net/amr.798-799.745.
Full textMingoti, G. Z., N. A. S. Rocha-Frigoni, B. C. S. Leão, and P. C. Dall'Acqua. "227 SUPPLEMENTATION WITH CYSTEINE, CYSTEAMINE, AND CATALASE DURING IN VITRO MATURATION PROTECTS BOVINE PRE-IMPLANTATION EMBRYOS FROM ANTI-DEVELOPMENTAL ACTIONS OF MENADIONE." Reproduction, Fertility and Development 27, no. 1 (2015): 203. http://dx.doi.org/10.1071/rdv27n1ab227.
Full textLi, Ting Ting, and Rui Li Jiao. "Design and Implementation of a Fast Algorithm for File Integrity Verification." Applied Mechanics and Materials 631-632 (September 2014): 918–22. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.918.
Full textSulastri, Santi, and Riana Defi Mahadji Putri. "Implementasi Enkripsi Data Secure Hash Algorithm (SHA-256) dan Message Digest Algorithm (MD5) pada Proses Pengamanan Kata Sandi Sistem Penjadwalan Karyawan." Jurnal Teknik Elektro 10, no. 2 (December 20, 2018): 70–74. http://dx.doi.org/10.15294/jte.v10i2.18628.
Full textBhandari, Asmin, Moshiur Bhuiyan, and P. W. C. Prasad. "Enhancement of MD5 Algorithm for Secured Web Development." Journal of Software 12, no. 4 (April 2017): 240–52. http://dx.doi.org/10.17706/jsw.12.4.240-252.
Full textBelo, Manuel Luis, Derwin Rony Sina, and Yelly Yosiana Nabuasa. "ALGORITMA MD5 DAN RC5 UNTUK PENGAMANAN FILE PDF." Jurnal Komputer dan Informatika 8, no. 1 (March 31, 2020): 68–75. http://dx.doi.org/10.35508/jicon.v8i1.2396.
Full textNalluri, Sravani, Somula Ramasubbareddy, and G. Kannayaram. "Cloud Application Security Based on Enhanced MD5 Algorithm." Journal of Computational and Theoretical Nanoscience 16, no. 5 (May 1, 2019): 2022–27. http://dx.doi.org/10.1166/jctn.2019.7843.
Full textKumar, Alok, Vikram Rajput, and Vineet Richarya. "3D - Playfair Cipher with Message Integrity using MD5." International Journal of Computer Applications 148, no. 9 (August 16, 2016): 6–12. http://dx.doi.org/10.5120/ijca2016911266.
Full textThompson, Eric. "MD5 collisions and the impact on computer forensics." Digital Investigation 2, no. 1 (February 2005): 36–40. http://dx.doi.org/10.1016/j.diin.2005.01.004.
Full textDey, Sweta. "A Secure Communicating MD5 based DICOM Annotation tool." ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY 7, no. 1 (April 5, 2021): 29–37. http://dx.doi.org/10.33130/ajct.2020v07i01.008.
Full textDey, Sweta. "A Secure Communicating MD5 based DICOM Annotation tool." ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY 7, no. 1 (April 5, 2021): 29–37. http://dx.doi.org/10.33130/ajct.2021v07i01.008.
Full textSamiullah, Muhammad, Waqar Aslam, Saima Sadiq, Arif Mehmood, and Gyu Sang Choi. "Hyperchaos and MD5 Based Efficient Color Image Cipher." Computers, Materials & Continua 72, no. 1 (2022): 1645–70. http://dx.doi.org/10.32604/cmc.2022.021019.
Full textTulman, E. R., C. L. Afonso, Z. Lu, L. Zsak, D. L. Rock, and G. F. Kutish. "The Genome of a Very Virulent Marek's Disease Virus." Journal of Virology 74, no. 17 (September 1, 2000): 7980–88. http://dx.doi.org/10.1128/jvi.74.17.7980-7988.2000.
Full textM.Ilyas Gultom, Muhadi, and Darjat Saripurna. "Perancangan Sistem Keamanan Aplikasi E-Voting Untuk Pemilihan Ketua Badan Eksekutif Mahasiswa Fakultas Teknik UISU Dengan Menggunakan Algoritma MD5." ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA 3, no. 2 (November 30, 2019): 70. http://dx.doi.org/10.30829/algoritma.v3i2.6438.
Full textJeong, Yoon-Su, Sung-Hee Woo, and Sang-Ho Lee. "Authentication Processing Optimization Model for the EAP-MD5 AAAv6 Operation." KIPS Transactions:PartC 12C, no. 5 (October 1, 2005): 757–64. http://dx.doi.org/10.3745/kipstc.2005.12c.5.757.
Full textZein and Ahmat Adil. "Aplikasi Media Bantu Pembelajaran Kriptografi Dengan Menggunakan Algoritma Message Digest 5 (MD5)." Jurnal Matrik 15, no. 2 (July 26, 2017): 44. http://dx.doi.org/10.30812/matrik.v15i2.33.
Full textMAO, Ming, Zhi-guang QIN, and Shao-hui CHEN. "Exploration of key points for attack of MD5 algorithm." Journal of Computer Applications 29, no. 12 (February 25, 2010): 3174–77. http://dx.doi.org/10.3724/sp.j.1087.2009.03174.
Full textPattiasina, Timothy John, and Adriane Lysandra. "STUDI LITERATUR KRIPTOGRAFI DENGAN ALGORITMA MESSAGE DIGEST 5 (MD5)." Teknika 2, no. 1 (July 1, 2013): 59–69. http://dx.doi.org/10.34148/teknika.v2i1.14.
Full textLaxmi, B. Prathusha, and A. Chilambuchelvan. "GSTP: Geographic Secured Two Phase Routing Using MD5 Algorithm." Circuits and Systems 07, no. 08 (2016): 1845–55. http://dx.doi.org/10.4236/cs.2016.78159.
Full text