Amanote Research

Amanote Research

    RegisterSign In

A Keyed Hash Function

IOSR Journal of Mathematics
doi 10.9790/5728-0544755
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2013

Authors
Joju K.T Joju K.T
Publisher

IOSR Journals


Related search

Interpreting Hash Function Security Proofs

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2010English

A Pseudorandom Number Generator With KECCAK Hash Function

International Journal of Computer and Electrical Engineering
2011English

Message Authentication With a New Quantum Hash Function

Computers, Materials and Continua
Mechanics of MaterialsElectronic EngineeringSimulationComputer Science ApplicationsElectricalModelingBiomaterials
2019English

A Probabilistic Model for Multimodal Hash Function Learning

2012English

Cryptographic Hash Function Using Cellular Automata

International Journal of Computer Applications Technology and Research
2016English

Security in Cloud Computing- Hash Function

International Journal of Computer Applications
2013English

A New Chaos-Based Image Cipher Using a Hash Function

International Journal of Networked and Distributed Computing
Computer NetworksComputer Science ApplicationsCommunications
2017English

An Enhanced Non-Cryptographic Hash Function

International Journal of Computer Applications
2020English

Role of Hash Function in Cryptography

2016English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy