[1] A.Arora,A.Rastogi,A.Khanna,A.Agarwal, 2017.Cloud Security Ecosystem for Data Security,7th International Conference on Cloud Computing, Data Science& Engineering - Confluence -
[2] A.Bhandari, 2017.Enhancement of MD5 Algorithm for Secured Web Development”,Journal of Software 12 240 -252
[3] A.Kasgar,J.Agrawal,S.Sahu, 2012.New Modified 256- bit MD5 Algorithm with SHA Compression Function”,International Journal of Computer Applications 42 -
[4] A.Pandey,P.Bonde, 2013.A Modified Approach For Cryptograpic Hash Function Based On MD5 Algorithm”,International Journal of Engineering Research & Technology (IJERT) 2 -
[5] C.Paar,J.Pelzl,B.Preneel, 2010.Understanding Cryptography: A Textbook for Students, -
[6] D.Farhan,M.Ali, 2015.Enhancement MD5 Depend on Multi Techniques”,International Journal on Software Engineering -
[7] E.Sediyono,K.Santoso, 2013.Secure Login by Using One-time Password Authentication Based on MD5 Hash Encrypted SMS”, -
[8] F.Wang,C.Yang,Q.Wu,Z.Shi, 2012.Constant Memory Optimizations in MD5 Crypt Cracking Algorithm on GPU Accelerated Supercomputer Using CUDA”,The 7th International Conference on Computer Science & Education (ICCSE -
[9] G.Raj,R.Kesireddi,S.Gupta, 2015.Enhancement of SecurityMechanism for Confidential Data using AES128, 192 and 256bit Encryption in Cloud”,1st International Conference on Next Generation Computing Technologies -
[10] Kumar and P.,Kumar, 2013.Rainbow Table to crack Password using MD5 Hashing Algorithm”,Proceedings of 2013 IEEE Conference on Information and Communication Technologies (ICT2013) -
[11] K.Kim, 2013.Efficient implementation of MD5 Algorithm in Password Recovery of a PDF file”, -
[12] K.Theoharoulis,I. Papaefstathiou, 2010.Implementing Rainbow Tables in High end FPGAs for superfast password Cracking”,International Conference on Field Programmable Logic and Applications -
[13] L.Zhong,W.Wan,D.Kong, 2016.Javaweb Login Authentication Based On Improved Md5 Algorithm”, -
[14] N.Khanezaei,Z.Hanapi, 2014.A Framework Based on RSA and AES Encryption Algorithms for Cloud Computing Services”,Conference on Systems, Process and Control -
[15] M. D. A. Chawdhury and A.,Habib, 2008.Security Enhancement of MD5 Hashed Passwords by Using the Unused Bits of TCP Header”,Proceedings of 11th International Conference on Computer and Information Technology (ICCIT -
[16] M.Kioon,Z.Wang and S. Das, 2013.Security Analysis of MD5 algorithm in Password Storage”,Proceedings of the 2nd International Symposium on Computer, Communication, Control and Automation (ISCCCA-13) -
[17] M.Stevens,A.Lenstra,B.Weger, .Chosenprefix Colisions for MD5 and applications,International Journal on Applied Cryptography 2 -
[18] Mehrabani,TelecommunicationsForum,TELFOR, 2012.Design of an ASIP Processor for MD5 Hash Algorithm”, -
[19] P.Walia,V.Thapar, 2014.Implementation of New Modified MD5-512 bit Algorithm for Cryptography”,International Journal of Innovative Research in Advanced Engineering (IJIRAE) 1 -
[20] Q.Kester,L.Nana,A.Pascu,S.Gire, 2013.A New Encyption Cipher for Securing Digital Images of Video Surveillance Devices using Diffie-Hellman- MD5 Algorithm and RGB shuffling”,European Modelling Symposium IEEE -
[21] R.Roshdy,M.Fouad,M.Aboul-Dahab, 2013.“Design And Implementation A New Security Hash Algorithm Based On Md5,International Journal of Engineering Sciences & Emerging Technologies 6 29 -36
[22] S.Sonh, 2012.A Study on Area-Efficient Design of Unified MD5 and HAS-160 Hash Algorithms”,The Journal of the Korean Institute of Information and Communication Engineering 16 1015 -1022
[23] V.Kapoor, 2014.A new security system using ECC and MD5”, -
[24] V.Mahalle,A.Shahade, 2014.Enhancing the Data Security in Cloud by Implementing Hybrid (Rsa & Aes) Encryption Algorithm”, -
[25] V.Mishra,V.Pandey, 2013.Architecture based on MD5 and MD5-512 Bit Applications,International Journal of Computer Applications” -
[26] 2014.Performance analysis of Black Hole attack Detection scheme using MD5 algorithm in WSN”,International Conference on Smart Structures & Systems -
[27] W.Xijin,F.Linxiu, 2012.The Application Research of MD5 Encryption Algorithm in DCT Digital Watermarking”,Physics Procedia -
[28] X.Zheng,J.Jin, 2012.Research for the Application and Safety of MD5 Algorithm in Password Authentication”, -
[29] Y.Sasaki, 2015.Improved Single-Key Distinguisher on HMACMD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC”,IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 26 -38
[30] C.Dobre, 2013.Hash Function XOR”,Information Security Journal -
[31] E.Vandierndonck, 2005.“XOR- based Hash Function”,IEEE Transactions on Computers 54 -
[32] G.Gordon, 2016., -
[33] A.Reyes,E.Festijo,R.Medina, 2018.Securing One Time Password (OTP) for MultiFactor Out-ofBand Athentication through a 128- bit Blowfish”,International Journal of Communication Networks and Information Security (IJCNIS) 10 -
[34] S.Nashwan, 2017.Secure and Efficient Hash Protocol for RFID System”,International Journal of Communication Networks and Information Security (IJCNIS 9 -
[35] M.Jain,N.Agrawal, 2015.,4th International Conference on System Modeling & Advancement in Research Trends (SMART) -
[36] A.Bhandari,M.Bhuiyan,P.Prasad, 2017.Enhancement of MD5 Algorithm for Secured Web Development”,Journal of Software 12 -
[37] G.Liu and H. Qi, 2014.Improvement and Implementation of an MD5 Algorithm”, Information Technology, -
[38] S.Tyagi,S.Luthra, 2014.A New Improved,International Journal of Engineering And Computer Science 3 7257 -7261
[39] A.Santra,N. S, 2012.A Modified MD5 Algorithm for Wireless Networks”,International Journal of Advanced Research in Computer Science 3 -
[40] Smith and S. Bhati, “A New Modified 512-bit Approach for MD5 Algorithm”, International Journal of Latest Technology in Engineering, Management & Applied Science, vol. 2, no. 8, 2013
[41] Wang, C. Yang, Q. Wu and Z. Shi, “Constant Memory Optimizations in MD5 Crypt Cracking Algorithm on GPU-Accelerated Supercomputer Using CUDA”, The 7th International Conference on Computer Science & Education, 2012
[42] G.Singh, 2013.Modified Vigenere Encryption Algorithm and its Hybrid Implementation with Base64 and AES”,Second International Conference on Advanced Computing -