Open AccessProceedings Article
The MD5 Message-Digest Algorithm
Ronald L. Rivest
- Vol. 1321, pp 1-21
Reads0
Chats0
TLDR
This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.Abstract:
This document describes the MD5 message-digest algorithm. The
algorithm takes as input a message of arbitrary length and produces as
output a 128-bit "fingerprint" or "message digest" of the input. This
memo provides information for the Internet community. It does not
specify an Internet standard.read more
Citations
More filters
Proceedings ArticleDOI
Homomorphic fingerprints under misalignments: sketching edit and shift distances
TL;DR: This paper presents the first linear sketch that is robust to a small number of alignment errors and can be used to determine whether two files are within a small Hamming distance of being a cyclic shift of each other.
Journal ArticleDOI
Prototype of a secure wireless patient monitoring system for the medical community
TL;DR: An extensive evaluation of the framework of a 6-node sensor test-bed is presented, measuring scalability and robustness as the number of sensors and the per node data rate are varied, showing that the proposed framework is a scalable, robust, reliable and secure solution for medical applications.
Journal ArticleDOI
DTD-Diff: A change detection algorithm for DTDs
TL;DR: This paper presents a novel algorithm called DTD-Diff to detect the changes to DTDs that defines the structure of a set of XML documents, and shows that converting DTD to XML schema (XSD) and detecting the changes using existing XML change detection algorithms is not a feasible option.
Proceedings ArticleDOI
Authentication of Signaling in VoIP Applications
TL;DR: This paper proposes a scheme for authenticating the end users identities with the outbound proxy server in that domain with the help of the registrar server based on end users public key infrastructure (PKI) certificate and strong one way hash function.
Journal ArticleDOI
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure
TL;DR: This paper formulate the trade-off between the nested certification overhead and the time improvement on certificate path verification, and numerically analyzed for a 4-level 20-ary balanced tree-shaped PKI.