Omega network hash construction
Cryptographic hash functions are very common and important cryptographic primitives. They are commonly used for data integrity checking and data authentication. Their architecture is based on the Merkle-Damgard construction, which takes in a variablelength input and produces a fixed-length hash v...
Saved in:
主要作者: | Chuah, Chai Wen |
---|---|
格式: | Thesis |
语言: | English |
出版: |
2009
|
主题: | |
在线阅读: | http://eprints.uthm.edu.my/3706/1/24p%20CHUAH%20CHAI%20WEN.pdf |
标签: |
添加标签
没有标签, 成为第一个标记此记录!
|
相似书籍
-
Implementation of hashed cryptography algorithm based on cryptography message syntax
由: Ali, Mohammed Ahnaf
出版: (2019) -
Enhancement Of Manchester Encoding Technique By Combining IT With A Hash Function
由: Hamarsheh, Mu'taz M. N.
出版: (2008) -
Design of a hash processor chip and the implementation of a digital signature subsystem for data security
由: Chong, Wei Sheng
出版: (2002) -
An enhanced LZ77 algorithm with hash table to compress large scale DNA sequence
由: Ahmad, Nor Azhar
出版: (2010) -
Flexible enhanced fuzzy min–max neural network model for pattern classification problems
由: Al-Hroob, Essam Muslem Harb
出版: (2020)