Showing 1 - 13 results of 13 for search '"MD5"', query time: 0.06s Refine Results
  1. 1

    Development of Android/iPhone application for image processing and searching by Zhang, Jiawei

    Published 2016
    “…With the WeChat API, the application realize the function of comparing the captured photo with the data library for the result of target MD5 code and use the code as an index obtain the specific name of the logo in the taken photo. …”
    Get full text
    Thesis
  2. 2

    Demonstration (web-based) of cryptographic hashing by Lim, Tony Dong Li

    Published 2018
    “…In this report, various cryptographic hashing algorithms will be explored and the implementation of the simulator for SHA-512 and MD5 using JavaScript will be explained.…”
    Get full text
    Final Year Project (FYP)
  3. 3

    Preimage security evaluations on Rijndael-based hashing: a comprehensive study by Zhang, Tianyu

    Published 2023
    “…The Meet-in-the-Middle (MITM) attack is one of the most powerful cryptanalysis techniques, as seen by its use in preimage attacks on MD4, MD5, Tiger, HAVAL, and Haraka-512 v2 hash functions and key recovery for full-round KTANTAN. …”
    Get full text
    Final Year Project (FYP)
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Efficacy of integrating Chinese and modern medicine in the treatment of Sjogren’s syndrome: a systematic review and meta-analysis by Leong, Kye Siong

    Published 2022
    “…In addition, the improvements in tear secretion function [MD=1.48, 95%CI(1.06,1.90), p<0.00001], salivary flow rate [MD=0.46, 95%CI(0.25,0.68), p<0.0001], ESR levels [MD=-5.95, 95%CI(-7.96,-3.94), p<0.0001], CRP levels [MD=-3.45, 95%CI(-4.90,-2.01), p<0.0001], and IgG levels [MD=-2.45, 95%CI(-3.80,-1.27), p<0.001] were better than the control group. …”
    Get full text
    Final Year Project (FYP)
  10. 10
  11. 11
  12. 12
  13. 13

    Automatic search of Meet-in-the-Middle preimage attacks on AES-like hashing by Bao, Zhenzhen, Dong, Xiaoyang, Guo, Jian, Li, Zheng, Shi, Danping, Sun, Siwei, Wang, Xiaoyun

    Published 2022
    “…The Meet-in-the-Middle (MITM) preimage attack is highly effective in breaking the preimage resistance of many hash functions, including but not limited to the full MD5, HAVAL, and Tiger, and reduced SHA-0/1/2. It was also shown to be a threat to hash functions built on block ciphers like AES by Sasaki in 2011. …”
    Get full text
    Conference Paper