Omega network hash construction
Cryptographic hash functions are very common and important cryptographic primitives. They are commonly used for data integrity checking and data authentication. Their architecture is based on the Merkle-Damgard construction, which takes in a variablelength input and produces a fixed-length hash v...
Saved in:
主要作者: | Chuah, Chai Wen |
---|---|
格式: | Thesis |
語言: | English |
出版: |
2009
|
主題: | |
在線閱讀: | http://eprints.uthm.edu.my/3706/1/24p%20CHUAH%20CHAI%20WEN.pdf |
標簽: |
添加標簽
沒有標簽, 成為第一個標記此記錄!
|
相似書籍
-
Implementation of hashed cryptography algorithm based on cryptography message syntax
由: Ali, Mohammed Ahnaf
出版: (2019) -
Enhancement Of Manchester Encoding Technique By Combining IT With A Hash Function
由: Hamarsheh, Mu'taz M. N.
出版: (2008) -
Design of a hash processor chip and the implementation of a digital signature subsystem for data security
由: Chong, Wei Sheng
出版: (2002) -
An enhanced LZ77 algorithm with hash table to compress large scale DNA sequence
由: Ahmad, Nor Azhar
出版: (2010) -
Flexible enhanced fuzzy min–max neural network model for pattern classification problems
由: Al-Hroob, Essam Muslem Harb
出版: (2020)