Omega network hash construction
Cryptographic hash functions are very common and important cryptographic primitives. They are commonly used for data integrity checking and data authentication. Their architecture is based on the Merkle-Damgard construction, which takes in a variablelength input and produces a fixed-length hash v...
Saved in:
Main Author: | Chuah, Chai Wen |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2009
|
Subjects: | |
Online Access: | http://eprints.uthm.edu.my/3706/1/24p%20CHUAH%20CHAI%20WEN.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019) -
Enhancement Of Manchester Encoding Technique By Combining IT With A Hash Function
by: Hamarsheh, Mu'taz M. N.
Published: (2008) -
Design of a hash processor chip and the implementation of a digital signature subsystem for data security
by: Chong, Wei Sheng
Published: (2002) -
An enhanced LZ77 algorithm with hash table to compress large scale DNA sequence
by: Ahmad, Nor Azhar
Published: (2010) -
Flexible enhanced fuzzy min–max neural network model for pattern classification problems
by: Al-Hroob, Essam Muslem Harb
Published: (2020)