Hash functions : analysis study /
While the some weaknesses have appeared in many hash functions such as MD4, MD5, RIPEMD-family and the series of Secure Hash Algorithm (SHA) families such as, SHA-0, SHA-1, SHA-2, with a number of SHA-3. Thus, National Institute of Standard and Technology (NIST) has suggested different principles to...
Saved in:
Main Author: | AbdulMajeed, Khanssaa Munthir |
---|---|
Format: | Thesis |
Language: | English |
Published: |
Kuala Lumpur :
Kulliyyah of Information and Communication Technology, International Islamic University Malaysia,
2013
|
Subjects: | |
Online Access: | Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
New cryptographic algorithms for hash function, block cipher and key agreement /
by: Mirvaziri, Hamid
Published: (2010) -
Data hiding for image using double layered embedding mechanism /
by: Zarrabi, Alireza
Published: (2010) -
Comparative analysis of algorithms used in encryption and decryption /
by: Barahim, Ala'a Ebrahim Abobaker
Published: (2009) -
Enhancement of the size of hidden data and the quality of image using LSB algorithm /
by: Zaidan, Bilal Bahaa
Published: (2009) -
Improved Algebraic Cryptanalysis of the Reduced-Round Advanced Encryption Standard
by: Rezaeipour, Davood
Published: (2011)