-
1
-
2
-
3
Securing password authentication using MD5 algorithm
Published 2014“…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
Get full text
Undergraduates Project Papers -
4
A VHDL Model for Implementation of MD5 Hash Algorithm
Published 2013-06-01“…The implementation of MD5 algorithm by using Xilinx-spartan-3A XCS1400AFPGA, with 50 MHz internal clock is helping for satisfies the above requirements.…”
Get full text
Article -
5
An Electro-optical Hybrid Encryption Method based on MD5 Verification
Published 2022-08-01Subjects: Get full text
Article -
6
SHA-1 and MD5 Cryptographic Hash Functions: Security Overview
Published 2015-02-01Subjects: Get full text
Article -
7
FPGA Design and Implementation of Data Covering Based on MD5 Algorithm
Published 2016-12-01“…The degree of these security algorithms depends on three keys; MD5 core code, MD5 iteration, and mode of data hashing. …”
Get full text
Article -
8
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…The architecture includes MD5 padding block, data path, and a controller. …”
Get full text
Get full text
Conference or Workshop Item -
9
Design and implementation of an ASIP-based cryptography processor for AES, IDEA, and MD5
Published 2017-08-01Subjects: Get full text
Article -
10
Issuing Digital Signatures for Integrity and Authentication of Digital Documents
Published 2023-09-01Subjects: “…MD5…”
Get full text
Article -
11
一种基于MD5校验的电光混合加密方法
Published 2022-01-01Subjects: “…混合加密;MD5算法;高级加密标准加密;超结构光纤布拉格光栅…”
Get full text
Article -
12
DIGITAL SIGNATURE PADA CITRA MENGGUNAKAN RSA DAN VIGENERE CIPHER BERBASIS MD5
Published 2019-04-01Subjects: Get full text
Article -
13
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2 & OSPF
Published 2009“…In this paper, we conduct performance evaluation comparisons on MD5 authenticated routing traffic with respect to EIGRP, RIPv2 and OSPF protocols. …”
Get full text
Article -
14
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
Published 2015-04-01“…In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. …”
Get full text
Article -
15
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
Published 2015-12-01Subjects: “…fragile watermark; image authentication; dwt; adaptive threshold; hvs; md-5; rsa.…”
Get full text
Article -
16
Kompresi Teks Menggunakan Algoritma Huffman dan Md5 pada Instant Messaging Smartphone Android
Published 2015-09-01“…Keywords—Huffman, MD5, Instant Message, SMS…”
Get full text
Article -
17
SHA512 and MD5 Algorithm Vulnerability Testing Using Common Vulnerability Scoring System (CVSS)
Published 2022-01-01Subjects: “…otp, sha512, md5, vapt, cvss…”
Get full text
Article -
18
Enhancement data integrity checking using combination MD5 and SHA1 algorithm in Hadoop architecture
Published 2017“…Therefore, this study aims to improve the functions available in Hue using MD5 and SHA1 cryptographic functions for data verification purposes. …”
Article -
19
Implementasi Enkripsi Data MD5 dan SHA-256 pada Sistem Informasi Peminjaman Buku Tanah
Published 2023-08-01Subjects: “…enkripsi, md5, sha-256, sistem, keamanan…”
Get full text
Article -
20