Amanote Research

Amanote Research

    RegisterSign In

Discover open access scientific publications

Search, annotate, share and cite publications


Publications by G. Vivek

Role of Hash Function in Cryptography

2016English

Related publications

Secure Mobile Computing Authentication Utilizing Hash, Cryptography and Steganography Combination

Journal of Information Security and Cybercrimes Research
2019English

A Keyed Hash Function

IOSR Journal of Mathematics
2013English

Security in Cloud Computing- Hash Function

International Journal of Computer Applications
2013English

Interpreting Hash Function Security Proofs

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2010English

Cryptanalysis of the CRUSH Hash Function

English

Collision Resistance of the JH Hash Function

IEEE Transactions on Information Theory
Computer Science ApplicationsInformation SystemsLibraryInformation Sciences
2012English

Cryptographic Hash Function Using Cellular Automata

International Journal of Computer Applications Technology and Research
2016English

Analysis of the Kupyna-256 Hash Function

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2016English

An Enhanced Non-Cryptographic Hash Function

International Journal of Computer Applications
2020English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy