The MD5 Message-Digest Algorithm
Citations
7,183 citations
Cites methods from "The MD5 Message-Digest Algorithm"
...The following subroutine generates a random 32-bit identifier using the MD5 routines published in RFC 1321 [26]....
[...]
6,527 citations
Cites background from "The MD5 Message-Digest Algorithm"
...Similarly, Jackson’s problem frames are selected to match particular solutions, rather than problems per se: one fits problems to frames, rather than adjusting frames to enclose problems [43]....
[...]
...Jackson’s Software Requirements & Specifications provides a (postmodern, poststructured) dictionary of development terminology, while Problem Frames recontextualises his earlier Structured Design and Structured Programming Methods as one technique amongst many [42, 43]....
[...]
5,850 citations
Cites background from "The MD5 Message-Digest Algorithm"
...VSEARCH includes public domain code for the MD5 algorithm written by Alexander Peslyak, and for SHA1 by Steve Reid and others....
[...]
...VSEARCH exclusively also offers the possibility of relabelling each sequence with the SHA-1 (Eastlake & Jones, 2001) or MD5 (Rivest, 1992) message digest (hash) of the sequence....
[...]
5,313 citations
5,172 citations
Cites methods from "The MD5 Message-Digest Algorithm"
...For hashing, we use the cryptographically strong MD5 algorithm [41]....
[...]