Open AccessProceedings Article
The MD5 Message-Digest Algorithm
Ronald L. Rivest
- Vol. 1321, pp 1-21
Reads0
Chats0
TLDR
This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.Abstract:
This document describes the MD5 message-digest algorithm. The
algorithm takes as input a message of arbitrary length and produces as
output a 128-bit "fingerprint" or "message digest" of the input. This
memo provides information for the Internet community. It does not
specify an Internet standard.read more
Citations
More filters
Journal ArticleDOI
Protecting cryptographic keys and computations via virtual secure coprocessing
John P. McGregor,Ruby B. Lee +1 more
TL;DR: This paper proposes architectural enhancements for general-purpose processors that protect core secrets by facilitating virtual secure coprocessing (VSCoP) and describes modest hardware modifications and a trusted software library that allow common computing devices to perform flexible, high-performance, and protected cryptographic computation.
Journal ArticleDOI
Extracting information networks from the blogosphere
TL;DR: A new term-weighting scheme is proposed that significantly improves on the state-of-the-art in the task of relation extraction, both when used in conjunction with the standard tf ċ idf scheme and also when used as a pruning filter.
Proceedings ArticleDOI
A compact FPGA implementation of the hash function whirlpool
TL;DR: This article presents a compact hardware implementation of the hash function Whirlpool that uses an innovative state representation that makes it possible to reduce the required hardware resources remarkably.
Proceedings Article
A low-power and high-throughput implementation of the SHA-1 hash function
TL;DR: In this paper, a new implementation of SHA-1 hash function is presented, which can exceed the 2 Gbps limit of the existing implementations by 53% in terms of power dissipation.
Proceedings ArticleDOI
Authentication of LZ-77 compressed data
TL;DR: A simple variation on the classic LZ-77 algorithm that allows one to hide, within the compressed document, enough information to warrant its authenticity, in such a way that the hidden data cannot be retrieved in a reasonable time by an attacker.