Open AccessProceedings Article
The MD5 Message-Digest Algorithm
Ronald L. Rivest
- Vol. 1321, pp 1-21
Reads0
Chats0
TLDR
This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.Abstract:
This document describes the MD5 message-digest algorithm. The
algorithm takes as input a message of arbitrary length and produces as
output a 128-bit "fingerprint" or "message digest" of the input. This
memo provides information for the Internet community. It does not
specify an Internet standard.read more
Citations
More filters
Book ChapterDOI
Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System
Markus Jakobsson,Moti Yung +1 more
TL;DR: Apart from increasing the security, client trust and availability of the system, distribution of power can also increase its functionality, as it is demonstrated.
Proceedings ArticleDOI
A practical implementation of transparent encryption and separation of duties in enterprise databases: protection against external and internal attacks on databases
TL;DR: In this paper, the authors present column-level database encryption as the only solution that is capable of protecting against external and internal threats, and at the same time meeting all regulatory requirements.
Proceedings Article
SNP: an interface for secure network programming
TL;DR: SNP provides a high-level abstraction for secure end-to-end network communications that hides the details of GSS-API as well as the cryptographic sublayer from the application programmers, thus preventing accidental or intentional disclosure by an application program.
Dissertation
Matching with Mismatches and Assorted Applications
TL;DR: A practical algorithm for “universal” delta compression (often called “feedback-free file synchronization”) which can operate in the presence of multiple indels and a large number of substitutions is given.
Journal ArticleDOI
Review: A survey of secure protocols in Mobile IPv6
TL;DR: This paper presents a state-of-the art survey of security protocols in MIPv6, and proposes taxonomy, and comparative study that does not exist in the surveys in the literature.