To see the other types of publications on this topic, follow the link: MD5.

Journal articles on the topic 'MD5'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'MD5.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Bowo, Prasetyo, Sumarmi Sumarmi, and Sri Hardiatmi. "PENERAPAN MACAM DAN DOSIS PUPUK ORGANIK TERHADAP PERTUMBUHAN DAN HASIL TANAMAN GANDUM (Triticum aestivum L.)." Innofarm:Jurnal Inovasi Pertanian 21, no. 1 (November 27, 2019): 1. http://dx.doi.org/10.33061/innofarm.v21i1.3311.

Full text
Abstract:
Penelitian tentang “Penerapan macam dan dosis pupuk organik terhadap pertumbuhan dan hasil tanaman Gandum (Triticum aestivum L.)’’ telah dilaksanakan tanggal 08 November 2018 sampai 31 januari 2019 di Green House Fakultas Pertanian Universitas Slamet Riyadi Surakarta. Penelitian ini bertujuan untuk mengetahui dan menentukan pengaruh terbaik terhadap pertumbuhan dan hasil tanaman gandum. Rancangan penelitian yang digunakan adalah rancangan acak lengkap yang terdiri dari 7 perlakuan dan 5 ulangan. Perlakuan : 1) MD0 = tanpa pupk (kontrol), 2) MD1= pupuk kandang dosis 200 g/polybag, 3) MD2 = pupuk kandang dosis 400 g/polybag , 4) MD3 = pupuk guano dosis 200 g/polybag, 5) MD4 = pupuk guano dosis 400 g/polybag, 6) MD5 = pupuk kascing dosis 200 g/polybag, 7) MD6 = pupuk kascing dosis 400 g/polybag. Hasil penelitian menunjukkan bahwa : 1) penerapan macam dan dosis pupuk organik berpengaruh terhadap tinggi tanaman, jumlah daun, dan jumlah anakan, 2) penerapan macam dan dosis pupuk organik tidak berpengaruh terhadaap berat segar brangkasan, berat kering brangkasan, jumlah biji, berat biji, dan berat 100 biji, 3) macam dan dosis pupuk terbaik adalah MD2 (pupuk kandang dosis 400 g/polybag) karena dapat meningkatkan jumlah daun dan jumlah anakan.
APA, Harvard, Vancouver, ISO, and other styles
2

SASAKI, Y., Y. NAITO, N. KUNIHIRO, and K. OHTA. "Improved Collision Attacks on MD4 and MD5." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E90-A, no. 1 (January 1, 2007): 36–47. http://dx.doi.org/10.1093/ietfec/e90-a.1.36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alam Hossain, Md. "Cryptanalyzing of Message Digest Algorithms MD4 and MD5." International Journal on Cryptography and Information Security 2, no. 1 (March 31, 2012): 1–13. http://dx.doi.org/10.5121/ijcis.2012.2101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pandey, Vandana, and V. K Mishra. "Architecture based on MD5 and MD5-512 Bit Applications." International Journal of Computer Applications 74, no. 9 (July 26, 2013): 29–33. http://dx.doi.org/10.5120/12914-9884.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ferdiansyah, Rahmat, and Paska Marto Hasugian. "Data Security System login With MD5 Algorithms in Applications deskresy.com." Journal Of Computer Networks, Architecture and High Performance Computing 2, no. 1 (January 1, 2020): 72–76. http://dx.doi.org/10.47709/cnapc.v2i1.359.

Full text
Abstract:
Cryptography is a technique of data security by processing the data (plaintext) using an encryption method so that the the data can not be read directly, especially by unauthorized parties. Confidential Data and information need to get serious attention considering the value of information contained in it so that procedures are needed to hide the messages stored Therein. Data security Becomes very important at this time, Because for every decision or policy making must be based on the data. Md5 is a substitute for MD4, MD5 is one of the most Widely used one-way hash functions, MD5 processes the input into blocks of 512 bits, the output of md5 is 128 bits and has a fixed length. MD5 algorithm is Widely used for various purposes in making security in applications, it is Often used to help login validation on the use of passwords stored in the database system
APA, Harvard, Vancouver, ISO, and other styles
6

SOUTHGATE, V. R., L. A. TCHUEM TCHUENTÉ, A. THÉRON, J. JOURDANE, A. LY, C. B. MONCRIEFF, and B. GRYSEELS. "Compatibility of Schistosoma mansoni Cameroon and Biomphalaria pfeifferi Senegal." Parasitology 121, no. 5 (November 2000): 501–5. http://dx.doi.org/10.1017/s0031182099006708.

Full text
Abstract:
The vectorial capacity of Biomphalaria pfeifferi from Ndiangue, Senegal, was investigated with an allopatric isolate of Schistosoma mansoni from Nkolbisson, Cameroon. The snail infection rate after exposure to a single miracidium per snail (MD1) was 56·3%, and 91·6% for snails exposed to 5 miracidia per snail (MD5). The minimum pre-patent period was 21 days. The mean total cercarial production for the MD1 group was 18511 cercariae per snail, and 9757 cercariae for the MD5 group. The maximum production of cercariae for 1 day was 4892 observed in a snail from the MD1 group at day 43 post-infection. The mean longevity of snails was higher in group MD1 (88 days p.i.) than in group MD5 (65 days p.i.). The chronobiological emergence pattern revealed a circadian rhythm with one shedding peak at mid-day. Comparisons are made with the vectorial capacity of the sympatric combination of B. pfeifferi Senegal/S. mansoni Senegal.
APA, Harvard, Vancouver, ISO, and other styles
7

SASAKI, Yu, Gaoli WANG, and Lei WANG. "Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E98.A, no. 1 (2015): 26–38. http://dx.doi.org/10.1587/transfun.e98.a.26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Богачкова, И. А., О. С. Заикин, С. Е. Кочемазов, И. В. Отпущенников, А. А. Семенов, and О. О. Хамисов. "Problems of search for collisions of cryptographic hash functions of the MD family as variants of Boolean satisfiability problem." Numerical Methods and Programming (Vychislitel'nye Metody i Programmirovanie), no. 1 (April 2, 2015): 61–77. http://dx.doi.org/10.26089/nummet.v16r107.

Full text
Abstract:
Рассмотрена реализация разностной атаки на криптографические хеш-функции MD4 (Message Digest 4) и MD5 (Message Digest 5) через сведение задачи поиска коллизий для этих хеш-функций к задаче о булевой выполнимости (SAT, SATisfiability). Новизна полученных результатов заключается в том, что предложены существенно более экономные (в сравнении с известными) SAT-кодировки рассматриваемых алгоритмов, а также в использовании для решения полученных SAT-задач современных многопоточных и параллельных SAT-решателей. Задачи поиска одноблоковых коллизий для MD4 в данной постановке оказались чрезвычайно простыми. Кроме того, найдены несколько десятков двухблоковых коллизий для MD5. В процессе соответствующих вычислительных экспериментов определен некоторый класс сообщений, дающих коллизии: построено множество пар дающих коллизии сообщений, у которых первые 10 байтов нулевые. An implementation of the differential attacks on cryptographic hash functions MD4 (Message Digest 4) and MD5 (Message Digest 5) by reducing the problems of search for collisions of these hash functions to the Boolean satisfiability problem (SAT) is considered. The novelty of the results obtained consists in a more compact (compared to already known) SAT encodings for the algorithms considered and in the use of modern parallel and distributed SAT solvers in applications to the formulated SAT problems. Searching for single block collisions of MD4 in this approach turned out to be very simple. In addition, several dozens of double block collisions of MD5 are found. In the process of the corresponding numerical experiments, a certain class of messages that produce the collisions is found: in particular, a set of pairs of such messages with first 10 zero bytes is constructed.
APA, Harvard, Vancouver, ISO, and other styles
9

Forte, Dario. "The death of MD5." Network Security 2009, no. 2 (February 2009): 18–20. http://dx.doi.org/10.1016/s1353-4858(09)70020-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Touch, Joseph D. "Performance analysis of MD5." ACM SIGCOMM Computer Communication Review 25, no. 4 (October 1995): 77–86. http://dx.doi.org/10.1145/217391.217414.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Gong, Wei, Yang Liu, and Lei Pan. "RETRACTED: Complexity of Generating Multi-collisions for MD4 and MD5." Physics Procedia 25 (2012): 874–78. http://dx.doi.org/10.1016/j.phpro.2012.03.171.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

SASAKI, Y., L. WANG, N. KUNIHIRO, and K. OHTA. "New Message Differences for Collision Attacks on MD4 and MD5." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E91-A, no. 1 (January 1, 2008): 55–63. http://dx.doi.org/10.1093/ietfec/e91-a.1.55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Barchett, Larry D., Arindam Banerji, John M. Tracey, and David L. Cohn. "Problems using MD5 with IPv6." Performance Evaluation 27-28 (October 1996): 507–18. http://dx.doi.org/10.1016/s0166-5316(96)90043-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Barchett, L. "Problems using MD5 with IPv6." Performance Evaluation 27-28, no. 1 (October 1996): 507–18. http://dx.doi.org/10.1016/0166-5316(96)00015-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Shi, Zhi Cai, Can Qun Yang, and Qiang Wu. "Scalable MD5 Crypt Cracker on PetaScale Supercomputer." Advanced Materials Research 532-533 (June 2012): 1080–84. http://dx.doi.org/10.4028/www.scientific.net/amr.532-533.1080.

Full text
Abstract:
MD5 Crypt is a cryptographic algorithm used commonly in UNIX system for authentication. Thanks to the additional randomization of the salt and complexity of the scheme, it makes the traditional password cracking techniques invalid on common computing systems so that the security of the system is guaranteed. As a result of the thriving of petaflops heterogeneous supercomputer system in recent decades, the security of MD5 Crypt is facing a threat of brute-force attack again. However, the complexity of heterogeneous programming and the sophistication of large-scale parallelism still hamper the password recovering. In this paper, we implemented brute-force attack of MD5 Crypt on Tianhe-1A,the world’s fastest supercomputer, by organizing the assignment between CPU and GPU reasonably and making several optimizations according to MD5 Crypt for GPU. Based on the experimental results, our algorithm achieves a great scalability. It checked more than 1.8 billion passwords in a second on the full system. Thus it issues a new challenge to the security of MD5 crypt for authentication.
APA, Harvard, Vancouver, ISO, and other styles
16

Priyatna, Bayu, and April Lia Hananto. "Password Data Authentication Using a Combination of MD5 and Playfair Cipher Matrix 13x13." Buana Information Technology and Computer Sciences (BIT and CS) 1, no. 2 (July 10, 2020): 33–36. http://dx.doi.org/10.36805/bit-cs.v1i2.980.

Full text
Abstract:
Data security and confidentiality are the most important things that must be considered in information systems. To protect the cryptographic algorithm reliability it uses. MD5 is one technique that is widely used in password data security issues, which algorithm has many advantages including. MD5 has a one-way hash function so that the message has been converted to a message digest, and it is complicated to restore it to the original message (plaintext). In addition to the advantages of MD5 also has a variety of shortcomings including; very easy to solve because MD5 has a fixed encryption result, using the MD5 modifier generator will be easily guessed, and MD5 is not proper because it is vulnerable to collision attacks. The research method used in this study uses Computer Science Engineering by conducting experiments combining two cryptographic arrangements. The results obtained from this study after being tested with Avalanche Effect technique get ciphertext randomness results of 43.69%, which tends to be very strong to be implemented in password data authentication.
APA, Harvard, Vancouver, ISO, and other styles
17

Gong, Wei, Yang Liu, and Lei Pan. "Retraction notice to “Complexity of Generating Multi-collisions for MD4 and MD5”." Physics Procedia 25 (2012): 2324. http://dx.doi.org/10.1016/j.phpro.2013.05.032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Wang, Lei, Yan Yan Yu, Qian Huang, Jun Yang, and Zheng Peng Zhao. "The Design and Implementation of the MD5 Algorithm Based on FPGA." Applied Mechanics and Materials 427-429 (September 2013): 806–9. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.806.

Full text
Abstract:
This paper introduces the principle of digital signature algorithm MD5, focused on the calculation phase of the algorithm, the algorithm structure iteration of the loop, and to optimize its calculation phase, and given FPGA design icon, the experiment can be drawn based on FPGA with less resource, fast implementation of the MD5 algorithm. The hardware implementation of the MD5 hash algorithm HMACs build encryption accelerator which has some practical value.
APA, Harvard, Vancouver, ISO, and other styles
19

Ah Kioon, Mary Cindy, Zhao Shun Wang, and Shubra Deb Das. "Security Analysis of MD5 Algorithm in Password Storage." Applied Mechanics and Materials 347-350 (August 2013): 2706–11. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2706.

Full text
Abstract:
Hashing algorithms are commonly used to convert passwords into hashes which theoretically cannot be deciphered. This paper analyses the security risks of the hashing algorithm MD5 in password storage and discusses different solutions, such as salts and iterative hashing. We propose a new approach to using MD5 in password storage by using external information, a calculated salt and a random key to encrypt the password before the MD5 calculation. We suggest using key stretching to make the hash calculation slower and using XOR cipher to make the final hash value impossible to find in any standard rainbow table.
APA, Harvard, Vancouver, ISO, and other styles
20

Pamula, D., and A. Ziebinski. "Hardware implementation of the MD5 algorithm." IFAC Proceedings Volumes 42, no. 1 (2009): 45–50. http://dx.doi.org/10.3182/20090210-3-cz-4002.00012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

ZHANG, SHao-lan, Guo-bo XING, and Yi-xian YANG. "Improvement and security analysis on MD5." Journal of Computer Applications 29, no. 4 (May 6, 2009): 947–49. http://dx.doi.org/10.3724/sp.j.1087.2009.00947.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Kuznetsov, Anton. "Parallel algorithm for MD5 collision attack." Program Systems: Theory and Applications 6, no. 3 (2015): 61–72. http://dx.doi.org/10.25209/2079-3316-2015-6-3-61-72.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Ayesh, Mr Shady, and Dr Mohammed Dweib. "SMA CRYPTOGRAPHY ALGORITHM DECRYPT MD5 SOLUTION." International Journal of Advanced Research 4, no. 11 (November 30, 2016): 290–96. http://dx.doi.org/10.21474/ijar01/2081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Tian, Ye, Kun Zhang, Pu Wang, Yuming Zhang, and Jun Yang. "Add "Salt" MD5 Algorithm’s FPGA Implementation." Procedia Computer Science 131 (2018): 255–60. http://dx.doi.org/10.1016/j.procs.2018.04.211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Sharma, Arvind K., and S. K. Mittal. "Cryptographic Merkle-Damgard Hash Construction: MD5 Vulnerabilities." Journal of Computational and Theoretical Nanoscience 17, no. 6 (June 1, 2020): 2435–40. http://dx.doi.org/10.1166/jctn.2020.8913.

Full text
Abstract:
Cryptography is a branch of Computer-Science which fully devotes towards further enhancements or innovations of various applications concern to information security i.e., to manage Confidentiality/ Integrity of resources. Confidentiality of resources most probably look after by ‘Encryption–Decryption’ techniques like ‘DES,’ ‘AES,’ ‘Blowfish,’ ‘Two-Fish,’ etc., were as ‘Integrity’ managed by Hash Functions, which have a distinct paramount significance in Network-Security/Computer- Security/Internet-Security. Both the ‘Integrity’ of data and ‘Authenticity’ of resource proved with the help of digest generated by the Hash algorithm. There are several hash algorithms available to provide distinct security, depends on how hard is to break it and pre-defined resource utilization (time/space). Some well-known names are MD4, MD5, SHA, JH, Skein, Grøstl, Blake, Hamsi, Fugue, Crush, Whirlpool, Tav, etc. In this article, we are focusing on vulnerabilities in the Merkle- Damgard scheme for constructing Hash-Functions with suitable implementation of MD5.
APA, Harvard, Vancouver, ISO, and other styles
26

Bahri, Zaiful, Joko Risanto, and Evfi Mahdiyah. "Desain Aplikasi Algoritma MD5 (Message Digest 5) Pada Media SMS Berbasis Android Mobile." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 8, no. 2 (November 16, 2017): 91–103. http://dx.doi.org/10.31849/digitalzone.v8i2.633.

Full text
Abstract:
Abstrak- Tulisan ini membahas tentang disain Aplikasi Algoritma MD5. Dalam desain ini dibuat model kirim dan terima SMS aman. Dari model ini bisa dibuat desain aplikasi berbasis objek menggunakan Unified Modeling Language (UML), State Machine untuk menggambarkan status pengiriman pesan dan Graphical User Interface (GUI) yang user friendly menggunakan Android Studio 2.3.3 dan gradle 3.3. Desain ini juga memerlukan sebuah database. Hasil desain ini dapat digunakan untuk membangun aplikasi mengirim dan menerima pesan aman secara umum dan khususnya aplikasi algoritma MD5 menggunakan Android. Kata kunci : Aplikasi, algoritma MD5, Android, SMS aman Abstract- This paper discusses the design of MD5 Algorithm application. In design is created a model to send and receive secured SMS. From this model is made an application design which is based on object using Unified Modeling Language (UML), State machine to give describing state of send and recive massage and Graphical User Interface (GUI) which is user friendly using Android Studio 2.3.3 and Gradle 3.3. The application design also uses a database. The result of design can be used to create an application to send and receive a secure message in general and especially message digest 5 algorithm using Android. Keywords : Application, MD5 algorithm, Android, secure SMS
APA, Harvard, Vancouver, ISO, and other styles
27

Vazquez-Medina, Ruben, Gonzalo Duchen Sanchez, and Paola Lucia Tellez Ballesteros. "Implementing First Round of MD5 in FPGA." Telecommunications and Radio Engineering 56, no. 1 (2001): 12. http://dx.doi.org/10.1615/telecomradeng.v56.i1.100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Stevens, Marc, Arjen K. Lenstra, and Benne De Weger. "Chosen-prefix collisions for MD5 and applications." International Journal of Applied Cryptography 2, no. 4 (2012): 322. http://dx.doi.org/10.1504/ijact.2012.048084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Liang, Jie, and Xue-Jia Lai. "Improved Collision Attack on Hash Function MD5." Journal of Computer Science and Technology 22, no. 1 (January 2007): 79–87. http://dx.doi.org/10.1007/s11390-007-9010-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Li, Zhi Chao, Jie Tao Diao, Qi You Xie, Jian Bin Liu, and Ce Zhu. "Design and Implementation of OTP Base on MD5." Applied Mechanics and Materials 644-650 (September 2014): 2433–37. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2433.

Full text
Abstract:
Encryption of information is getting increasingly large attention, due to the popularity of internet and the advance of technology. One of the encryption algorithms, MD5, is commonly used in data encryption nowadays. In this paper, MD5 algorithm was briefly described and used to construct a dynamic password encryption technique with time parameters. This dynamic password has no internal relevance, which means the new password can not be derived using previous passwords. Generation of password also takes a relative short time frame, such that in theory the encryption system can not be breached.
APA, Harvard, Vancouver, ISO, and other styles
31

Fang, Linan, Ting Wu, Yongxing Qi, Yanzhao Shen, Peng Zhang, Mingmin Lin, and Xinfeng Dong. "Improved collision detection of MD5 with additional sufficient conditions." Electronic Research Archive 30, no. 6 (2022): 2018–32. http://dx.doi.org/10.3934/era.2022102.

Full text
Abstract:
<abstract><p>One application of counter-cryptanalysis is detecting whether a message block is involved in a collision attack, such as the detection of MD5 and SHA-1. Stevens and Shumow speeded up the detection of SHA-1 by introducing unavoidable conditions in message blocks. They left a challenge: how to determine unavoidable conditions for MD5. Later, Shen et al. found that the unavoidable conditions of MD5 were the sufficient conditions located in the last round of differential paths. In this paper, we made further work. We discover sufficient conditions in the second round that can also be used as unavoidable conditions. With additional sufficient conditions, we subdivide three sets and distinguish seven more classes. As a result, compared with Shen's collision detection algorithm, our improved algorithm reduces the collision detection cost by 8.18%. Finally, we find that they do exist in the differential paths constructed by the automatic tool "HashClash".</p></abstract>
APA, Harvard, Vancouver, ISO, and other styles
32

Liu, Yu. "Dynamic Encryption Lock Used for Matching Random Signals by Algorithm Program." Advanced Materials Research 798-799 (September 2013): 745–48. http://dx.doi.org/10.4028/www.scientific.net/amr.798-799.745.

Full text
Abstract:
This project aimed to make a research on code lock containing algorithm and dynamic random code based on the existing intelligent lock. This code lock can control the door lock through software program, which was to draw random digit into MD5 program of single chip microcomputer, allow the same data being processed by MD5 encryption program to present different results, such that, the encryption program can keep dynamics, so the MD5 encryption program being amended by pseudo-random number existed separately in key and lock, then this program would be the identity card for key to open the door and only the program of key was identical with that of the lock can the door open, which largely improved the safety.
APA, Harvard, Vancouver, ISO, and other styles
33

Mingoti, G. Z., N. A. S. Rocha-Frigoni, B. C. S. Leão, and P. C. Dall'Acqua. "227 SUPPLEMENTATION WITH CYSTEINE, CYSTEAMINE, AND CATALASE DURING IN VITRO MATURATION PROTECTS BOVINE PRE-IMPLANTATION EMBRYOS FROM ANTI-DEVELOPMENTAL ACTIONS OF MENADIONE." Reproduction, Fertility and Development 27, no. 1 (2015): 203. http://dx.doi.org/10.1071/rdv27n1ab227.

Full text
Abstract:
Menadione (MD), a naphthoquinone used as a vitamin K source in animal feed, can generate reactive oxygen species (ROS) and cause apoptosis. Hence, we examined whether MD reduces development of pre-implantation bovine embryos by inducing ROS production and apoptosis and tested the hypothesis that the anti-developmental actions of MD would be reduced by supplementation of the in vitro maturation (IVM) medium with antioxidants (a mixture of 0.6 mM cysteine + 100 μM cysteamine + 100 UI mL–1 catalase). Cumulus-oocyte complexes (COC; n = 3334; 50 per well in 11 replications) were matured in IVM medium (TCM-199 with bicarbonate, hormones, and 10% FCS) for 22 h. After fertilization, presumptive zygotes were cultured in synthetic oviduct fluid medium (SOF) with 2.5% FCS and 0.5% BSA up to 7 days (Day 0 = IVF). On Day 6, MD was included in the SOF medium (0 μM: Control; or 5.0 μM: MD5) during 24 h. All cultures were conducted at 38.5°C in 5% CO2 in air. In a second experiment, COC were matured in TCM-199 supplemented with or without the mixture of antioxidants (Antiox; only during IVM) and with or without MD at Day 6 in a 2 × 2 factorial design (Control, Control/Antiox, MD5, MD5/Antiox). The cleavage and blastocysts rates were evaluated on Days 3 and 7, respectively. A sample of the blastocysts (n = 1112) was stained for TUNEL (In Situ Cell Death Detection Kit, Roche, Indianapolis, IN, USA) to detect the apoptotic cells or with 5 μM H2DCFDA (Molecular Probes, Canada) to evaluate the ROS levels. Stained embryos were evaluated under an epifluorescence microscope and the images of embryos stained with H2DCFDA were analysed by Q-Capture Pro image software for determining the fluorescent intensity. The means (±s.e.m.) were compared by ANOVA followed by Tukey's test (P < 0.05). In the first experiment, and the cleavage rates were similar (P > 0.05) for Control (80.5% ± 0.9) and MD5 groups (78.9% ± 1.2), but the blastocyst rates were lower (P < 0.05) in the MD5 group (25.9% ± 2.1) when compared with Control (36.4% ± 1.5). The rate of apoptotic cells in blastocysts was higher (P < 0.05) in the MD5 group (19.2% ± 0.7) than in Control (10.0% ± 0.5), as well as the fluorescence intensity for ROS quantification (0.7 ± 0.1 v. 1.1 ± 0.1, respectively, for Control and MD5 groups). In an effort to rescue the impaired embryonic development, a mixture of antioxidants was added to the IVM medium and the results were transitional in response in which MD5/Antiox (28.3% ± 3.5) was intermediate (P > 0.05) between the Controls [Control (38.2% ± 2.5) and Control/Antiox (34.7% ± 1.9) groups] and the MD5 (21.4% ± 2.9) group. Principal effects evaluated were the presence of MD (without: 35.9% ± 2.3 v. with: 24.8% ± 2.3; P < 0.05) or Antiox (without: 28.4% ± 2.3 v. with: 32.3% ± 2.3; P > 0.05). In conclusion, addition of MD to embryonic culture reduces the blastocyst development and increases intracellular levels of ROS and the occurrence of apoptosis. Anti-developmental actions of MD on embryonic development can be partially blocked by treating oocytes with a mixture of antioxidants during IVM.Financial support was provided by FAPESP (2012/10083-8 and 2013/07382-6).
APA, Harvard, Vancouver, ISO, and other styles
34

Li, Ting Ting, and Rui Li Jiao. "Design and Implementation of a Fast Algorithm for File Integrity Verification." Applied Mechanics and Materials 631-632 (September 2014): 918–22. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.918.

Full text
Abstract:
At present, MD5 algorithm is commonly used in the file transfer system to conduct the tests of file integrity, but when a file is too large, it will take a long time to generate MD5 code for the whole file, with the result of reducing the transmission efficiency of the file. Based on this conduction, a fast algorithm of file integrity detection is provided, which can generate MD5 code with the file size and some random content of the file. Although the algorithm cannot test files roundly, it is integrated into the file transfer system. The test results show that this algorithm can detect the file integrity faster, and when the file is damaged or tampered with, the probability of detecting changes of the file content is higher than the theoretical value. The algorithm has great value in engineering applications.
APA, Harvard, Vancouver, ISO, and other styles
35

Sulastri, Santi, and Riana Defi Mahadji Putri. "Implementasi Enkripsi Data Secure Hash Algorithm (SHA-256) dan Message Digest Algorithm (MD5) pada Proses Pengamanan Kata Sandi Sistem Penjadwalan Karyawan." Jurnal Teknik Elektro 10, no. 2 (December 20, 2018): 70–74. http://dx.doi.org/10.15294/jte.v10i2.18628.

Full text
Abstract:
There are various types of encryption that can be used, for example MD5 and SHA-256. However, using MD5 or SHA-256 alone is not safe enough because it can be solved by using a brute force attack. The method of working is very simple is to try all possible combinations. This study aims to develop MD5 and SHA256 collaboration methods. Encryption is applied to the user's password on the web login system. Simulation results can be tested by measuring resistance to brute force attacks and the value of the avalanche effect (AE). From the results of the tests carried out by using attack software, the results of the application are quite safe from brute force attacks. From the AE test obtained the result with an AE value of 71% which means that the encoding result is good enough.
APA, Harvard, Vancouver, ISO, and other styles
36

Bhandari, Asmin, Moshiur Bhuiyan, and P. W. C. Prasad. "Enhancement of MD5 Algorithm for Secured Web Development." Journal of Software 12, no. 4 (April 2017): 240–52. http://dx.doi.org/10.17706/jsw.12.4.240-252.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Belo, Manuel Luis, Derwin Rony Sina, and Yelly Yosiana Nabuasa. "ALGORITMA MD5 DAN RC5 UNTUK PENGAMANAN FILE PDF." Jurnal Komputer dan Informatika 8, no. 1 (March 31, 2020): 68–75. http://dx.doi.org/10.35508/jicon.v8i1.2396.

Full text
Abstract:
Dokumen elektronik adalah jenis berkas digital yang digunakan untuk menyimpan data atau informasi penting seseorang atau suatu lembaga. Terdapat beberapa format file dokumen yang paling banyak digunakan yaitu .docx, .xlsx, .pptx, dan .pdf. Masalah yang muncul ketika suatu perusahaan, institusi atau organisasi yang mempunyai dokumen-dokumen rahasia dan data-data yang penting berupa file dokumen bisa diakses oleh orang atau pihak yang tidak memiliki wewenang. Solusi pengamanan dokumen dapat menggunakan konsep kriptografi. Jenis file dokumen yang dapat dienkripsi dibatasi pada file Portable Document Format(.pdf). Pada penelitian ini dilakukan pengamanan kunci inputan user menggunakan algoritma Message Digest 5 (MD5) dan pengacakan nilai binary pada file pdf menggunakan algoritma Rivest Code (RC5). Hasil pengujian menggunakan (i) kunci yang sama pada file pdf yang berbeda menunjukkan bahwa binary chiperfile yang dihasilkan berbeda dengan binary plainfile yang diambil.Hal ini diketahui dari tingkat kesamaan binary chiperfile dan binary plainfile yang kecil/rendah berdasar pada nilai kolerasi yang dihasilkan tiap pengujian adalah (i) 0,205795252, (ii) 0,24692765, (iii) 0,22421886.
APA, Harvard, Vancouver, ISO, and other styles
38

Nalluri, Sravani, Somula Ramasubbareddy, and G. Kannayaram. "Cloud Application Security Based on Enhanced MD5 Algorithm." Journal of Computational and Theoretical Nanoscience 16, no. 5 (May 1, 2019): 2022–27. http://dx.doi.org/10.1166/jctn.2019.7843.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Kumar, Alok, Vikram Rajput, and Vineet Richarya. "3D - Playfair Cipher with Message Integrity using MD5." International Journal of Computer Applications 148, no. 9 (August 16, 2016): 6–12. http://dx.doi.org/10.5120/ijca2016911266.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Thompson, Eric. "MD5 collisions and the impact on computer forensics." Digital Investigation 2, no. 1 (February 2005): 36–40. http://dx.doi.org/10.1016/j.diin.2005.01.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Dey, Sweta. "A Secure Communicating MD5 based DICOM Annotation tool." ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY 7, no. 1 (April 5, 2021): 29–37. http://dx.doi.org/10.33130/ajct.2020v07i01.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Dey, Sweta. "A Secure Communicating MD5 based DICOM Annotation tool." ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY 7, no. 1 (April 5, 2021): 29–37. http://dx.doi.org/10.33130/ajct.2021v07i01.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Samiullah, Muhammad, Waqar Aslam, Saima Sadiq, Arif Mehmood, and Gyu Sang Choi. "Hyperchaos and MD5 Based Efficient Color Image Cipher." Computers, Materials & Continua 72, no. 1 (2022): 1645–70. http://dx.doi.org/10.32604/cmc.2022.021019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Tulman, E. R., C. L. Afonso, Z. Lu, L. Zsak, D. L. Rock, and G. F. Kutish. "The Genome of a Very Virulent Marek's Disease Virus." Journal of Virology 74, no. 17 (September 1, 2000): 7980–88. http://dx.doi.org/10.1128/jvi.74.17.7980-7988.2000.

Full text
Abstract:
ABSTRACT Here we present the first complete genomic sequence, with analysis, of a very virulent strain of Marek's disease virus serotype 1 (MDV1), Md5. The genome is 177,874 bp and is predicted to encode 103 proteins. MDV1 is colinear with the prototypic alphaherpesvirus herpes simplex virus type 1 (HSV-1) within the unique long (UL) region, and it is most similar at the amino acid level to MDV2, herpesvirus of turkeys (HVT), and nonavian herpesviruses equine herpesviruses 1 and 4. MDV1 encodes 55 HSV-1 UL homologues together with 6 additional UL proteins that are absent in nonavian herpesviruses. The unique short (US) region is colinear with and has greater than 99% nucleotide identity to that of MDV1 strain GA; however, an extra nucleotide sequence at the Md5 US/short terminal repeat boundary results in a shorter US region and the presence of a second gene (encoding MDV097) similar to the SORF2 gene. MD5, like HVT, encodes an ICP4 homologue that contains a 900-amino-acid amino-terminal extension not found in other herpesviruses. Putative virulence and host range gene products include the oncoprotein MEQ, oncogenicity-associated phosphoproteins pp38 and pp24, a lipase homologue, a CxC chemokine, and unique proteins of unknown function MDV087 and MDV097 (SORF2 homologues) and MDV093 (SORF4). Consistent with its virulent phenotype, Md5 contains only two copies of the 132-bp repeat which has previously been associated with viral attenuation and loss of oncogenicity.
APA, Harvard, Vancouver, ISO, and other styles
45

M.Ilyas Gultom, Muhadi, and Darjat Saripurna. "Perancangan Sistem Keamanan Aplikasi E-Voting Untuk Pemilihan Ketua Badan Eksekutif Mahasiswa Fakultas Teknik UISU Dengan Menggunakan Algoritma MD5." ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA 3, no. 2 (November 30, 2019): 70. http://dx.doi.org/10.30829/algoritma.v3i2.6438.

Full text
Abstract:
<p><em>E-voting Is the use of hardware and software to establish an electronic system that is useful in the electoral process by making electronic votes that replace ballot papers. E-Voting was introduced by several e-Government especially in Europe in a request to serve the voting provisions by providing a control system, so that voters can vote whenever and wherever. To avoid all forms of fraud and damage to data which is certainly very important for the voting process, it is necessary to secure data by applying cryptography to the data. Currently there are many methods or algorithms that can be used to protect data from various types of attacks, but of course each algorithm has advantages and disadvantages of each. MD5 is a concise message algorithm developed by Ron rivest. MD5 has actually been rooted in a series of concise message algorithms, which are the predecessors of md5, all developed by Rivest. The original digest message is called md.</em></p>
APA, Harvard, Vancouver, ISO, and other styles
46

Jeong, Yoon-Su, Sung-Hee Woo, and Sang-Ho Lee. "Authentication Processing Optimization Model for the EAP-MD5 AAAv6 Operation." KIPS Transactions:PartC 12C, no. 5 (October 1, 2005): 757–64. http://dx.doi.org/10.3745/kipstc.2005.12c.5.757.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Zein and Ahmat Adil. "Aplikasi Media Bantu Pembelajaran Kriptografi Dengan Menggunakan Algoritma Message Digest 5 (MD5)." Jurnal Matrik 15, no. 2 (July 26, 2017): 44. http://dx.doi.org/10.30812/matrik.v15i2.33.

Full text
Abstract:
College of Informatics and Computer Management (STMIK) Bumigora Mataram, for Computer Network competencies are elective courses that network security system which addresses the cryptographic material using a lecture and power point as a medium while studying in the classroom. Those problems led to the idea to create teaching aids media applications using cryptographic message digest algorithm 5 (MD5). Cryptography is the science that is used to encrypt a message, so the message private. On the application every student can learn and try to direct the activities of the MD5 algorithm program in step by step. This algorithm has a characteristic that the message is converted into a message digest can not be restored into the original message. Two different messages always produce different hash values. So as to facilitate faculty to improve student comprehension. Based on theresults of questionnaires to the lecturer stated that the application can assist the lecturer delivered material MD5 cryptographic algorithm. And the results of the questionnaire of the student that can be assisted in doing to learn anytime and anywhere as long as the application can access media learning aids such as web-based applications online.
APA, Harvard, Vancouver, ISO, and other styles
48

MAO, Ming, Zhi-guang QIN, and Shao-hui CHEN. "Exploration of key points for attack of MD5 algorithm." Journal of Computer Applications 29, no. 12 (February 25, 2010): 3174–77. http://dx.doi.org/10.3724/sp.j.1087.2009.03174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Pattiasina, Timothy John, and Adriane Lysandra. "STUDI LITERATUR KRIPTOGRAFI DENGAN ALGORITMA MESSAGE DIGEST 5 (MD5)." Teknika 2, no. 1 (July 1, 2013): 59–69. http://dx.doi.org/10.34148/teknika.v2i1.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Laxmi, B. Prathusha, and A. Chilambuchelvan. "GSTP: Geographic Secured Two Phase Routing Using MD5 Algorithm." Circuits and Systems 07, no. 08 (2016): 1845–55. http://dx.doi.org/10.4236/cs.2016.78159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography