-
1
Securing password authentication using MD5 algorithm
Published 2014“…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
Get full text
Undergraduates Project Papers -
2
A VHDL Model for Implementation of MD5 Hash Algorithm
Published 2013-06-01“…The implementation of MD5 algorithm by using Xilinx-spartan-3A XCS1400AFPGA, with 50 MHz internal clock is helping for satisfies the above requirements.…”
Get full text
Article -
3
SHA-1 and MD5 Cryptographic Hash Functions: Security Overview
Published 2015-02-01Subjects: Get full text
Article -
4
FPGA Design and Implementation of Data Covering Based on MD5 Algorithm
Published 2016-12-01“…The degree of these security algorithms depends on three keys; MD5 core code, MD5 iteration, and mode of data hashing. …”
Get full text
Article -
5
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…The architecture includes MD5 padding block, data path, and a controller. …”
Get full text
Get full text
Conference or Workshop Item -
6
Design and implementation of an ASIP-based cryptography processor for AES, IDEA, and MD5
Published 2017-08-01Subjects: Get full text
Article -
7
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2 & OSPF
Published 2009“…In this paper, we conduct performance evaluation comparisons on MD5 authenticated routing traffic with respect to EIGRP, RIPv2 and OSPF protocols. …”
Get full text
Article -
8
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
Published 2015-04-01“…In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. …”
Get full text
Article -
9
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
Published 2015-12-01Subjects: “…fragile watermark; image authentication; dwt; adaptive threshold; hvs; md-5; rsa.…”
Get full text
Article -
10
Kompresi Teks Menggunakan Algoritma Huffman dan Md5 pada Instant Messaging Smartphone Android
Published 2015-09-01“…Keywords—Huffman, MD5, Instant Message, SMS…”
Get full text
Article -
11
SHA512 and MD5 Algorithm Vulnerability Testing Using Common Vulnerability Scoring System (CVSS)
Published 2022-01-01Subjects: “…otp, sha512, md5, vapt, cvss…”
Get full text
Article -
12
-
13
PSLAPS-IoD: A Provable Secure and Lightweight Authentication Protocol for Securing Internet-of-Drones (IoD) Environment
Published 2024-01-01Subjects: Get full text
Article -
14
-
15
Dynamic Application Partitioning and Task-Scheduling Secure Schemes for Biosensor Healthcare Workload in Mobile Edge Cloud
Published 2021-11-01Subjects: Get full text
Article -
16
Merkle-Damgård Construction Method and Alternatives: A Review
Published 2017-01-01Subjects: Get full text
Article -
17
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…The objective of this project is to compare MD5 & SHA-1 algorithm in data deduplication technique and to evaluate the MD5 & SHA-1 algorithm, length of message digest and speed using deduplication software. …”
Get full text
Thesis -
18
Pathogenicity and Pathotype Analysis of Henan Isolates of Marek’s Disease Virus Reveal Long-Term Circulation of Highly Virulent MDV Variant in China
Published 2022-07-01“…Pathotyping of HN302 was performed in comparison to a standard very virulent (vv) MDV strain Md5. We found that both CVI988 and HVT vaccines significantly reduced morbidity and mortality induced by HN302 or Md5 strains, but the protection indices (PIs) provided by these two vaccines against HN302 were significantly lower (27.03%) or lower (33.33%) than that against Md5, which showed PIs of 59.89% and 54.29%, respectively. …”
Get full text
Article -
19
Evaluation of the proximate composition, functional, and pasting properties of ichipipi maize flour
Published 2024-06-01“…Convesely, the amounts of carbohydrates and fat were considerably reduced (p < 0.05) by 2.93 % and 10.93 %, respectively, from the ichipipi flour MD1 to MD5. Regarding the functional properties, water absorption and swelling capacities decreased, while the least gelation concentration increased significantly (p < 0.05) in the composite flours MD1 to MD5. …”
Get full text
Article -
20
Donor BMI and Post–living Donor Liver Transplantation Outcomes: A Preliminary Report
Published 2023-02-01Get full text
Article