Showing 1 - 4 results of 4 for search '"MD4"', query time: 0.06s Refine Results
  1. 1
  2. 2

    Analysis of cryptographic hash functions by Guo, Jian

    Published 2011
    “…We also improved the meet-in-the-middle preimage attacks, one of the most powerful techniques for breaking one-wayness of many functions, and applied these techniques to SHA-2, Tiger, MD4, and HAVAL to find preimages. All these techniques await for further development and applications to other hash functions including the candidates in current SHA-3 competition.…”
    Get full text
    Thesis
  3. 3

    Comparing the efficacy ultrasound guided bilateral transversus abdominis plane (TAP) block between 0.25% bupivacaine versus 0.125% bupivacaine in laparoscopic appendicectomy by Zulkipeli, Zubaidah

    Published 2017
    “…The total PCA fentanyl requirement between both groups were insignificant (132.95mcg vs 128.64mcg) (MD:4.32, p value = 0.73). No complication arises from TAP block. …”
    Get full text
    Thesis
  4. 4

    A collision resistant cryptographic hash function based on cellular automata rules by Jamil, Norziana

    Published 2013
    “…Popular hash functions are Message Digest 4/5 (MD-4/5), Secure Hashing Algorithm (SHA-0/1) and RIPEMD, which are referred to as MDx-class hash functions due to some commonalities in their design with the MD-family. …”
    Get full text
    Thesis