Comparison of hash function algorithms against attacks: a review

Hash functions are considered key components of nearly all cryptographic protocols, as well as of many security applications such as message authentication codes, data integrity, password storage, and random number generation. Many hash function algorithms have been proposed in order to ensure authe...

全面介紹

Saved in:
書目詳細資料
Main Authors: Maetouq, Ali, Mohd. Daud, Salwani, Ahmad, Noor Azurati, Maarop, Nurazean, Sjarif, Nilam Nur Amir, Abas, Hafiza
格式: Article
語言:English
出版: Science and Information Organization 2018
主題:
在線閱讀:http://eprints.utm.my/id/eprint/84578/1/AliMaetouq2018_ComparisonofHashFunctionAlgorithmsAgainst.pdf
http://eprints.utm.my/id/eprint/84578/
http://dx.doi.org/10.14569/IJACSA.2018.090813
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!