Open AccessProceedings Article
The MD5 Message-Digest Algorithm
Ronald L. Rivest
- Vol. 1321, pp 1-21
Reads0
Chats0
TLDR
This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.Abstract:
This document describes the MD5 message-digest algorithm. The
algorithm takes as input a message of arbitrary length and produces as
output a 128-bit "fingerprint" or "message digest" of the input. This
memo provides information for the Internet community. It does not
specify an Internet standard.read more
Citations
More filters
IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines
TL;DR: This document provides suggestions on Remote Authentication Dial In User Service (RADIUS) usage by IEEE 802.1X Authenticators.
Proceedings ArticleDOI
Privacy via pseudorandom sketches
Nina Mishra,Mark Sandler +1 more
TL;DR: This paper introduces a new technique to describe parts of an individual's data that is based on pseudorandom sketches that guarantee that each individual's privacy is provably maintained and does not rely on any unproven cryptographic conjectures.
Journal ArticleDOI
Securing BGP — A Literature Survey
TL;DR: The Internet's routing architecture and the design of BGP in particular is examined, and no proposal has been seen as offering a combination of adequate security functions, suitable performance overheads and deployable support infrastructure.
Proceedings ArticleDOI
Us vs. Them: Understanding Social Dynamics in Wikipedia with Revert Graph Visualizations
TL;DR: Revert Graph is constructed, a tool that visualizes the overall conflict patterns between groups of users and enables visual analysis of opinion groups and rapid interactive exploration of those relationships via detail drill- downs.
Journal ArticleDOI
A secure address resolution protocol
Mohamed G. Gouda,Chin-Tser Huang +1 more
TL;DR: An architecture for securely resolving IP addresses into hardware addresses over an Ethernet and two protocols: an invite-accept protocol and a request-reply protocol that are designed to overcome the actions of any adversary that can lose sent messages, arbitrarily modify the fields of sent message, and replay old messages is proposed.