[1]
R. Rivest. The MD5 message digest algorithm. RFA Data Security. April (1992).
Google Scholar
[2]
S. Chen, W. Huang. FPGA Implementation of MD5 Algorithm. Information Security and Communications Privacy. Vol. 6 (2007), p.129.
Google Scholar
[3]
K. Liu, M. Che. A IN Cun-xiu A High Throughput FPGA Implementation of MD5 A lgorithm. MICROPROCE SSORS. Vol. 1 (2008), p.188.
Google Scholar
[4]
W. Chen. The Encryption Techniques of MD5 and Security Analysis. Computer Knowledge and Technology. \Vol. 19 (2007), p.87.
Google Scholar
[5]
ZH.J. Shi, CH.J. Ma, J. Cote and B. Wang. Hardware Implementation of Hash Functions. Introduction to Hardware Security and Trust. Vol. 6 (2012), p.27.
DOI: 10.1007/978-1-4419-8080-9_2
Google Scholar
[6]
M. Meenakumari and G. Athisha. A Survey on Protection of FPGA Based IP Designs. International Journal of Advanced Electrical and Electronics Engineering. Vol. 2 (2013), p.93.
Google Scholar
[7]
Adam Tisovsky and Ivan Baronak. Analytical Model of IPsec Process Throughput. Information and Communication Technologies and Services. Vol. 10 (2012), p.162.
DOI: 10.15598/aeee.v10i3.681
Google Scholar
[8]
X.L. Wei. Research and application ofMD5 encryption algorithm. Information Technology. Vol. 7 (2010), p.144.
Google Scholar
[9]
X. Zeng, X.W. Gao, E.H. Lu and Y. Chen. High-speed implementation of the MD5 hash algorithm. Journal of Chengdu University of Information Technology. Vol. 24 (2009), p.129.
Google Scholar