Amanote Research
Register
Sign In
A Keyed Hash Function
IOSR Journal of Mathematics
doi 10.9790/5728-0544755
Full Text
Open PDF
Abstract
Available in
full text
Date
January 1, 2013
Authors
Joju K.T Joju K.T
Publisher
IOSR Journals
Related search
Interpreting Hash Function Security Proofs
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
A Pseudorandom Number Generator With KECCAK Hash Function
International Journal of Computer and Electrical Engineering
Message Authentication With a New Quantum Hash Function
Computers, Materials and Continua
Mechanics of Materials
Electronic Engineering
Simulation
Computer Science Applications
Electrical
Modeling
Biomaterials
A Probabilistic Model for Multimodal Hash Function Learning
Cryptographic Hash Function Using Cellular Automata
International Journal of Computer Applications Technology and Research
Security in Cloud Computing- Hash Function
International Journal of Computer Applications
A New Chaos-Based Image Cipher Using a Hash Function
International Journal of Networked and Distributed Computing
Computer Networks
Computer Science Applications
Communications
An Enhanced Non-Cryptographic Hash Function
International Journal of Computer Applications
Role of Hash Function in Cryptography