[PDF]Design and Analysis of a New Hash Algorithm with Key (original) (raw)

Design and Analysis of a New Hash Algorithm with Key Integration

Upendra Mishra

International Journal of Computer Applications, 2013

View PDFchevron_right

A secured Cryptographic Hashing Algorithm

Niharjyoti Sarangi

Arxiv preprint arXiv:1003.5787, 2010

View PDFchevron_right

Design of Efficient Hashing Algorithm to Enhance Information / Network Security

sajid mohammadi

2018

View PDFchevron_right

Advancing the Cryptographic Hash-Based Message Authentication Code

Ashish Avasthi

International Journal of Engineering and Technology, 2011

View PDFchevron_right

IJERT-A Novel Secured Cryptographic Hash (NSCH) Algorithm

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2014

View PDFchevron_right

An Overview of Cryptographic Hash Functions

Sugata Sanyal

2002

View PDFchevron_right

CRYPTOGRAPHIC HASH FUNCTIONS –A SURVEY

IJESMR Journal

View PDFchevron_right

An Implementation on Secure Hash Algorithm in Wireless Algorithms to Ensure the Integrity

Dr. Amit Sinhal

View PDFchevron_right

Analytical Performance of One-Way Cryptographic Hash Function for Enhancing Security on Network

Ankita Chhikara, Ramesh Kait

2021

View PDFchevron_right

Cryptographic Hash Functions and Attacks – A Detailed Study

Ambar Dutta

International Journal of Advanced Research in Computer Science, 2020

View PDFchevron_right

A Comparative Study of Hash Algorithms in Cryptography

IJCSMC Journal

IJCSMC, 2019

View PDFchevron_right

An Efficient Cryptographic Hash Algorithm (BSA)

Bimol Roy

2010

View PDFchevron_right

Message Integrity in the World Wide Web: Use of Nested Hash Function and a Fast Stream Cipher

Dr .K. Poulose Jacob

2006 International Conference on Advanced Computing and Communications, 2006

View PDFchevron_right

A New Message Digest Function for Message Authentication

Imrul Hasan

umdrive.memphis.edu

View PDFchevron_right

Hashing and Message Authentication Code Implementation. An Embedded Approach

Marius Rogobete

Scientific Bulletin of Naval Academy, 2019

View PDFchevron_right

Improving Security Through Hashing

IOSR Journals

View PDFchevron_right

Design and Implementation a New Security Hash Algorithm Based on MD5 and SHA-256

M. Aboul-dahab

2014

View PDFchevron_right

Development and Implementation of Hash Function for Generating Hashed Message

Erfaneh Noroozi

Advances in Science and Technology Research Journal, 2016

View PDFchevron_right

AN ENHANCED HASH BASED CRYPTOGRAPHIC ALGORITHM

murthy g s n, GJESR Journal

View PDFchevron_right

A remark on hash functions for message authentication

Chris Mitchell

Computers & Security, 1989

View PDFchevron_right

New hash functions and their use in authentication and set equality

Larry Carter

Journal of Computer and System Sciences, 1981

View PDFchevron_right

Comparison of Hash Function Algorithms Against Attacks: A Review

hafiza abas

View PDFchevron_right

Summarizing data for secure transaction: A hash algorithm

SiNAN BAŞAR

African Journal of Business Management, 2011

View PDFchevron_right

A Keyed Hash Function

IOSR Journals

View PDFchevron_right

Secure and Time Efficient Hash-based Message Authentication Algorithm for Wireless Sensor Networks

Haider Mashhadi

View PDFchevron_right

Efficient small-sized implementation of the keyed-hash message authentication code

Athanasios Kakarountas

Computer as a Tool, …, 2005

View PDFchevron_right

Preserving Authenticity and Integrity of Distributed Networks through Novel Message Authentication Code

Eduard Babulak

Indonesian Journal of Electrical Engineering and Computer Science, 2018

View PDFchevron_right

A new Hash Function Based on Combination of Existing Digest Algorithms

Mahamod Ismail

2007

View PDFchevron_right

Security Attacks and its Related Authentication Scheme by Hash Application Features

Varsha jotwani

International Journal of Scientific Research in Computer Science Applications and Management Studies, 2018

View PDFchevron_right

IRJET-A REVIEW TOWARDS VARIOUS HASH ALGORITHMS AND THEIR COMPARATIVE ANALYSIS

IRJET Journal

View PDFchevron_right

A Novel Hash Chain Construction for Simple and Efficient Authentication

Masakazu Soshi

View PDFchevron_right

Data Integrity Mechanism Using Hashing Verification

Rushdi Hamamreh

2014

View PDFchevron_right

Cryptography Algorithm

Gaurav Chhikara

2019

View PDFchevron_right