Data Securing of Patients in Cloud Computing Using A Combination of SHA256 and MD5
Abstract
References
Index Terms
- Data Securing of Patients in Cloud Computing Using A Combination of SHA256 and MD5
Recommendations
Full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5
CRYPTO'07: Proceedings of the 27th annual international cryptology conference on Advances in cryptologyAt Crypto '06, Bellare presented new security proofs for HMAC and NMAC, under the assumption that the underlying compression function is a pseudo-random function family. Conversely, at Asiacrypt '06, Contini and Yin used collision techniques to obtain ...
Collisions of MMO-MD5 and their impact on original MD5
AFRICACRYPT'11: Proceedings of the 4th international conference on Progress in cryptology in AfricaIn this paper, we find collisions of MD5 in the Matyas-Meyer-Oseas mode and Miyaguchi-Preneel mode with a complexity of 239 operations, which runs contrary to the cryptographer's belief that these modes are stronger against collision attacks than the ...
New Message Differences for Collision Attacks on MD4 and MD5
In 2005, collision resistance of several hash functions was broken by Wang et al. The strategy of determining message differences is the most important part of collision attacks against hash functions. So far, many researchers have tried to analyze Wang ...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 201Total Downloads
- Downloads (Last 12 months)12
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in