Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Edem Swathi
Role of Hash Function in Cryptography
Related publications
Secure Mobile Computing Authentication Utilizing Hash, Cryptography and Steganography Combination
Journal of Information Security and Cybercrimes Research
A Keyed Hash Function
IOSR Journal of Mathematics
Security in Cloud Computing- Hash Function
International Journal of Computer Applications
Interpreting Hash Function Security Proofs
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Cryptanalysis of the CRUSH Hash Function
Collision Resistance of the JH Hash Function
IEEE Transactions on Information Theory
Computer Science Applications
Information Systems
Library
Information Sciences
Cryptographic Hash Function Using Cellular Automata
International Journal of Computer Applications Technology and Research
Analysis of the Kupyna-256 Hash Function
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
An Enhanced Non-Cryptographic Hash Function
International Journal of Computer Applications