Hash functions : analysis study /

While the some weaknesses have appeared in many hash functions such as MD4, MD5, RIPEMD-family and the series of Secure Hash Algorithm (SHA) families such as, SHA-0, SHA-1, SHA-2, with a number of SHA-3. Thus, National Institute of Standard and Technology (NIST) has suggested different principles to...

Full description

Saved in:
Bibliographic Details
Main Author: AbdulMajeed, Khanssaa Munthir
Format: Thesis
Language:English
Published: Kuala Lumpur : Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2013
Subjects:
Online Access:Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library.
Tags: Add Tag
No Tags, Be the first to tag this record!

Similar Items