Showing 1 - 20 results of 12,702 for search '"MD5"', query time: 0.29s Refine Results
  1. 1
  2. 2
  3. 3

    Securing password authentication using MD5 algorithm by Siti Nabilah , Mohammad Zain

    Published 2014
    “…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
    Get full text
    Undergraduates Project Papers
  4. 4

    A VHDL Model for Implementation of MD5 Hash Algorithm by Mohammed A. Noaman

    Published 2013-06-01
    “…The implementation of MD5 algorithm by using Xilinx-spartan-3A XCS1400AFPGA, with 50 MHz internal clock is helping for satisfies the above requirements.…”
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    FPGA Design and Implementation of Data Covering Based on MD5 Algorithm by Thamir R. Saeed

    Published 2016-12-01
    “…The degree of these security algorithms depends on three keys; MD5 core code, MD5 iteration, and mode of data hashing. …”
    Get full text
    Article
  8. 8

    Design and implementation of MD5 hash function algorithm using verilog HDL by Shamsiah, Suhaili, Niam, Cleopatra Chundang, Zainah, Md Zain, Norhuzaimin, Julai

    Published 2022
    “…The architecture includes MD5 padding block, data path, and a controller. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10
  11. 11

    一种基于MD5校验的电光混合加密方法 by 宣冉, 巩小雪, 张琦涵, 李瑞, 乔一竞, 侯维刚

    Published 2022-01-01
    Subjects: “…混合加密;MD5算法;高级加密标准加密;超结构光纤布拉格光栅…”
    Get full text
    Article
  12. 12
  13. 13

    A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2 & OSPF by Mohd Tahir, Hatim, Abu Al-Saud, Khalid, Saleh, Moutaz, Saleh, Mohammed

    Published 2009
    “…In this paper, we conduct performance evaluation comparisons on MD5 authenticated routing traffic with respect to EIGRP, RIPv2 and OSPF protocols. …”
    Get full text
    Article
  14. 14

    Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain by Nehad Hameed Hussein

    Published 2015-04-01
    “…In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. …”
    Get full text
    Article
  15. 15

    Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain by Nehad Hameed Hussein, Ass. Lect.

    Published 2015-12-01
    Subjects: “…fragile watermark; image authentication; dwt; adaptive threshold; hvs; md-5; rsa.…”
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    Enhancement data integrity checking using combination MD5 and SHA1 algorithm in Hadoop architecture by Idris, Yaakub, Ismail, Saiful Adli, Mohd. Azmi, Nurulhuda Firdaus, Azmi, Azri, Azizan, Azizul

    Published 2017
    “…Therefore, this study aims to improve the functions available in Hue using MD5 and SHA1 cryptographic functions for data verification purposes. …”
    Article
  19. 19
  20. 20