[PDF]Design and Analysis of a New Hash Algorithm with Key (original) (raw)
Related papers
Design and Analysis of a New Hash Algorithm with Key Integration
International Journal of Computer Applications, 2013
A secured Cryptographic Hashing Algorithm
Arxiv preprint arXiv:1003.5787, 2010
Design of Efficient Hashing Algorithm to Enhance Information / Network Security
2018
Advancing the Cryptographic Hash-Based Message Authentication Code
International Journal of Engineering and Technology, 2011
IJERT-A Novel Secured Cryptographic Hash (NSCH) Algorithm
International Journal of Engineering Research and Technology (IJERT), 2014
An Overview of Cryptographic Hash Functions
2002
CRYPTOGRAPHIC HASH FUNCTIONS –A SURVEY
An Implementation on Secure Hash Algorithm in Wireless Algorithms to Ensure the Integrity
Analytical Performance of One-Way Cryptographic Hash Function for Enhancing Security on Network
2021
Cryptographic Hash Functions and Attacks – A Detailed Study
International Journal of Advanced Research in Computer Science, 2020
A Comparative Study of Hash Algorithms in Cryptography
IJCSMC, 2019
An Efficient Cryptographic Hash Algorithm (BSA)
2010
Message Integrity in the World Wide Web: Use of Nested Hash Function and a Fast Stream Cipher
2006 International Conference on Advanced Computing and Communications, 2006
A New Message Digest Function for Message Authentication
umdrive.memphis.edu
Hashing and Message Authentication Code Implementation. An Embedded Approach
Scientific Bulletin of Naval Academy, 2019
Improving Security Through Hashing
Design and Implementation a New Security Hash Algorithm Based on MD5 and SHA-256
2014
Development and Implementation of Hash Function for Generating Hashed Message
Advances in Science and Technology Research Journal, 2016
AN ENHANCED HASH BASED CRYPTOGRAPHIC ALGORITHM
A remark on hash functions for message authentication
Computers & Security, 1989
New hash functions and their use in authentication and set equality
Journal of Computer and System Sciences, 1981
Comparison of Hash Function Algorithms Against Attacks: A Review
Summarizing data for secure transaction: A hash algorithm
African Journal of Business Management, 2011
Secure and Time Efficient Hash-based Message Authentication Algorithm for Wireless Sensor Networks
Efficient small-sized implementation of the keyed-hash message authentication code
Computer as a Tool, …, 2005
Indonesian Journal of Electrical Engineering and Computer Science, 2018
A new Hash Function Based on Combination of Existing Digest Algorithms
2007
Security Attacks and its Related Authentication Scheme by Hash Application Features
International Journal of Scientific Research in Computer Science Applications and Management Studies, 2018
IRJET-A REVIEW TOWARDS VARIOUS HASH ALGORITHMS AND THEIR COMPARATIVE ANALYSIS
A Novel Hash Chain Construction for Simple and Efficient Authentication
Data Integrity Mechanism Using Hashing Verification
2014
2019