RIPEMD and Chameleon hash function
| Main Authors: | Mahmood Al Dabbagh, Sufyan Salim, Alshaikhli, Imad Fakhri Taha, Abdulmajed, Khanssaa Munthir, Abdul Matin, Ahmad Faridi, Hussein, Sibomana Hilali |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/20636/ http://irep.iium.edu.my/20636/1/C12_-_RIPEMD.pdf |
Similar Items
SHA family hash function
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011)
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011)
Introduction
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011)
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011)
Message Digest (MDx) family
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Hash function of finalist SHA-3: analysis study
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Protection of the digital holy Quran using SAB hash function
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Cryptographic hash function: A high level view
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
OLBCA: a new lightweight block cipher algorithm
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014)
Improving the security of LBlock lightweight algorithm using bit permutation
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
Improving PRESENT lightweight algorithms
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
HISEC: a new lightweight block cipher algorithm
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Introduction
by: Israfil, Muhammad, et al.
Published: (2011)
by: Israfil, Muhammad, et al.
Published: (2011)
Shamir’s threshold scheme
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Blakely’s secret sharing scheme
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Protection of the digital Holy Quran hash digest by using cryptography algorithms
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Cryptographic hash function: a high level view
by: Taha, Imad, et al.
Published: (2015)
by: Taha, Imad, et al.
Published: (2015)
Enhancement of lightweight block cipher algorithms
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Design of Optimized Pipelined RIPEMD-160 with High Frequency and Throughput
by: Suhaili, S., et al.
Published: (2016)
by: Suhaili, S., et al.
Published: (2016)
Tests of chameleon gravity
by: Burrage, Clare, et al.
Published: (2018)
by: Burrage, Clare, et al.
Published: (2018)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
A compendium of chameleon constraints
by: Burrage, Clare, et al.
Published: (2016)
by: Burrage, Clare, et al.
Published: (2016)
Ellipticity weakens chameleon screening
by: Burrage, Clare, et al.
Published: (2015)
by: Burrage, Clare, et al.
Published: (2015)
The shape dependence of chameleon screening
by: Burrage, Clare, et al.
Published: (2018)
by: Burrage, Clare, et al.
Published: (2018)
The Shape Dependence of Chameleon Gravity
by: Briddon, Chad
Published: (2023)
by: Briddon, Chad
Published: (2023)
Rivest-Shamir-Adleman (RSA)
by: Mohammed Hayek, Iqram, et al.
Published: (2011)
by: Mohammed Hayek, Iqram, et al.
Published: (2011)
Cryptanalysis of RSA
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Digital signature algorithm
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Enhancing lightweight block cipher algorithm OLBCA through decreasing cost factor
by: Al-Dabbagh, Sufyan Salim Mahmood, et al.
Published: (2016)
by: Al-Dabbagh, Sufyan Salim Mahmood, et al.
Published: (2016)
Enhancing lightweight block cipher algorithm OLBCA
through decreasing cost factor
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2015)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2015)
The influence of internet and social media on
purchasing decisions in Egypt and a comparison
between Egypt and Kuwait
by: Alenezi, Khalid Abdulkareem, et al.
Published: (2017)
by: Alenezi, Khalid Abdulkareem, et al.
Published: (2017)
Lightweight block cipher algorithms: review paper
by: Salim, Sufyan, et al.
Published: (2016)
by: Salim, Sufyan, et al.
Published: (2016)
How to avoid a swift kick in the chameleons
by: Padilla, Antonio, et al.
Published: (2016)
by: Padilla, Antonio, et al.
Published: (2016)
The influence of internet and social media on purchasing
decisions in Kuwait
by: Abdulkareem Al-Enezi, Khalid, et al.
Published: (2018)
by: Abdulkareem Al-Enezi, Khalid, et al.
Published: (2018)
Block and stream cipher
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Data Encryption Standard (DES)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Advanced Encryption Standard (AES)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Similar Items
-
SHA family hash function
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011) -
Introduction
by: Abdulmajed, Khanssaa Munthir, et al.
Published: (2011) -
Message Digest (MDx) family
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011) -
Hash function of finalist SHA-3: analysis study
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013) -
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)