scispace - formally typeset
Open AccessProceedings Article

The MD5 Message-Digest Algorithm

Ronald L. Rivest
- Vol. 1321, pp 1-21
Reads0
Chats0
TLDR
This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Abstract
This document describes the MD5 message-digest algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. This memo provides information for the Internet community. It does not specify an Internet standard.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Protecting cryptographic keys and computations via virtual secure coprocessing

TL;DR: This paper proposes architectural enhancements for general-purpose processors that protect core secrets by facilitating virtual secure coprocessing (VSCoP) and describes modest hardware modifications and a trusted software library that allow common computing devices to perform flexible, high-performance, and protected cryptographic computation.
Journal ArticleDOI

Extracting information networks from the blogosphere

TL;DR: A new term-weighting scheme is proposed that significantly improves on the state-of-the-art in the task of relation extraction, both when used in conjunction with the standard tf ċ idf scheme and also when used as a pruning filter.
Proceedings ArticleDOI

A compact FPGA implementation of the hash function whirlpool

TL;DR: This article presents a compact hardware implementation of the hash function Whirlpool that uses an innovative state representation that makes it possible to reduce the required hardware resources remarkably.
Proceedings Article

A low-power and high-throughput implementation of the SHA-1 hash function

TL;DR: In this paper, a new implementation of SHA-1 hash function is presented, which can exceed the 2 Gbps limit of the existing implementations by 53% in terms of power dissipation.
Proceedings ArticleDOI

Authentication of LZ-77 compressed data

TL;DR: A simple variation on the classic LZ-77 algorithm that allows one to hide, within the compressed document, enough information to warrant its authenticity, in such a way that the hidden data cannot be retrieved in a reasonable time by an attacker.