Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,356,357 papers from all fields of science
Search
Sign In
Create Free Account
MDC-2
Known as:
MDC2
, Meyer-Schilling
In cryptography, MDC-2 (Modification Detection Code 2, sometimes called Meyer-Schilling) is a cryptographic hash function. MDC-2 is a hash function…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Cryptographic hash function
Cryptography
Hexadecimal
One-way compression function
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Generalized Construction of Compression Function to Build a Cryptographic Hash
Rashed Mazumder
,
Md. Ahsan Habib
,
Maheen Islam
International Conference on Informatics…
2019
Corpus ID: 204230293
A Cryptographic hash is called one way function where it receives and returns data in an arbitrary and fixed size respectively…
Expand
2017
2017
The Combat Cloud: Enabling Multi-Domain Command and Control Across the Range of Military Operations
Aaron Kiser
,
Jacob Hess
,
El Mostafa Bouhafa
,
Shawn Williams
2017
Corpus ID: 196019232
Abstract : In March of 2016, the Air Force released an operating concept for the Combat Cloud, defined as ...an overarching…
Expand
2016
2016
Análisis del comportamiento físico-mecánico de una mezcla densa en caliente tipo MDC-2 modificada con caucho y cuero en porcentajes de 25% y 75%, respectivamente
Camilo André Aranda-Rojas
,
César Mauricio Clavijo-Rey
,
Luis Ángel Moreno-Anselmi
2016
Corpus ID: 114700919
The goal of this research is to determinate and to analyze the physical and mechanical behavior of one of the most used asphalt…
Expand
2015
2015
Hierarchical Brokering with feedback state observation in Mobile Device-Centric Clouds
Chao-Lieh Chen
,
Chun-Ting Chen
Seventh International Conference on Ubiquitous…
2015
Corpus ID: 18926643
We propose a Hierarchical Brokering Architecture (HiBA) and feedback control framework for Mobile Device-Centric Cloud (MDC2…
Expand
2013
2013
Caracterización física de ligantes asfálticos con CECABASE para mezclas tibias
S. L. Torres
,
P. K. R. Cabezas
2013
Corpus ID: 107496573
Reduce energy consumption and emissions in the production of asphalt mixtures requires the reduction of production temperatures…
Expand
2012
2012
New Preimage Attack on MDC-4
Deukjo Hong
,
Daesung Kwon
IACR Cryptology ePrint Archive
2012
Corpus ID: 6091080
In this paper, we provide some cryptanalytic results for double-blocklength (DBL) hash modes of block ciphers, MDC-4. Our…
Expand
2011
2011
ダイナモメータシステム用新形コントローラ MDC2 (ダイナモメータシステム特集) -- (新製品・新システム)
招 行正
,
成見 靖昌
2011
Corpus ID: 172906998
2009
2009
Cryptanalysis of MDC-2
L. Knudsen
,
Florian Mendel
,
Christian Rechberger
,
Søren S. Thomsen
International Conference on the Theory and…
2009
Corpus ID: 9982661
We provide a collision attack and preimage attacks on the MDC-2 construction, which is a method (dating back to 1988) of turning…
Expand
2007
2007
THE MAGNETIC FIELD OF THE SUPERCONDUCTING RING CYCLOTRON
J. Ohnishi
,
H. Okuno
,
N. Fukunishi
,
K. Yamada
,
Y. Yano
2007
Corpus ID: 55350424
The magnetic field mapping of the superconducting ring cyclotron (SRC) was made in the spring of 2006 before installing the RF…
Expand
2007
2007
Hash Function Design Principles Supporting Variable Output Lengths from One Small Function
D. Chang
,
M. Nandi
,
Jesang Lee
,
Jaechul Sung
,
Seokhie Hong
2007
Corpus ID: 14896523
In this paper, we introduce new hash function design principles with variable output lengths (multiple of n). It is based on a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE