A collision resistant cryptographic hash function based on cellular automata rules
The subject of this thesis is the study of collision resistant hash function. A cryptographic hash function is one of the cryptographic primitives designed to protect the integrity of data such as that in digital signatures and online business transactions. Popular hash functions are Message Digest...
| Main Author: | Jamil, Norziana |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2013
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/33800/ http://psasir.upm.edu.my/id/eprint/33800/1/FSKTM%202013%201R.pdf |
Similar Items
Cellular Automata-based Algorithm for Liquid Diffusion Phenomenon Modeling using imaging technique
by: Al-Ghaili, Abbas Mohammed Ali
Published: (2013)
by: Al-Ghaili, Abbas Mohammed Ali
Published: (2013)
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
by: Hamdi, Ayman Majid
Published: (2019)
by: Hamdi, Ayman Majid
Published: (2019)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
Lightweight verification and fine-grained access control in named data networking based on schnorr signature and hash functions
by: Wu, Shanglun, et al.
Published: (2021)
by: Wu, Shanglun, et al.
Published: (2021)
Understanding the evolution of superalloy microstructure during inertia friction welding using in-situ x-ray diffraction and cellular automata
by: Rowson, Matthew
Published: (2021)
by: Rowson, Matthew
Published: (2021)
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Cellular automation for efficient impulse noise removal and edge detection using graphic processor unit
by: Jalalian, Afsaneh
Published: (2010)
by: Jalalian, Afsaneh
Published: (2010)
Generalized hash-binary-tree based self-healing key distribution with implicit authentication
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
A Fast Incremental Cryptographic Hash Function
by: Goi , Bok Min
Published: (2003)
by: Goi , Bok Min
Published: (2003)
A Fast Incremental Cryptographic Hash Function
by: Goi, Bok Min
Published: (2003)
by: Goi, Bok Min
Published: (2003)
A key management scheme for heterogeneous sensor networks using keyed-hash chain
by: Tian, Biming, et al.
Published: (2009)
by: Tian, Biming, et al.
Published: (2009)
Extending dynamic models of mining subsidence
by: Xu-gang, Lian, et al.
Published: (2011)
by: Xu-gang, Lian, et al.
Published: (2011)
Cryptographic hash function: a high level view
by: Taha, Imad, et al.
Published: (2015)
by: Taha, Imad, et al.
Published: (2015)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Cryptographic hash function: A high level view
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
Cellular automata based user authentication scheme using identity-bits commitment for wireless sensor network
by: Jamil, Norziana, et al.
Published: (2011)
by: Jamil, Norziana, et al.
Published: (2011)
Personalised cryptographic key generation based on FaceHashing
by: TEOH, A
Published: (2004)
by: TEOH, A
Published: (2004)
An error diffusion based method to generate functionally graded cellular structures
by: Brackett, D., et al.
Published: (2014)
by: Brackett, D., et al.
Published: (2014)
Immune Cells Function and Activation in Response to Carica Papaya L. Consumed by Healthy Individuals
by: Loh, Chiew Yee
Published: (2011)
by: Loh, Chiew Yee
Published: (2011)
A cellular neural network based deformable model
by: Zhong, Yongmin, et al.
Published: (2006)
by: Zhong, Yongmin, et al.
Published: (2006)
A cellular neural network methodology for deformable object simulation
by: Zhong, Yongmin, et al.
Published: (2006)
by: Zhong, Yongmin, et al.
Published: (2006)
Teletraffic Performance of Hierarchical Cellular Network in Different Populations of Slow Mobile Generated Traffics
by: Ali, Abdul Halim
Published: (1999)
by: Ali, Abdul Halim
Published: (1999)
Periodic Cellular Automata of Period-3
by: Ganikhodjaev, Nasir, et al.
Published: (2015)
by: Ganikhodjaev, Nasir, et al.
Published: (2015)
Periodic cellular automata of Period-3
by: Ganikhodjaev, Nasir, et al.
Published: (2015)
by: Ganikhodjaev, Nasir, et al.
Published: (2015)
Periodic cellular automata of period-2
by: Ganikhodjaev, Nasir, et al.
Published: (2016)
by: Ganikhodjaev, Nasir, et al.
Published: (2016)
Automated evolutionary design of self-assembly and self-organising systems
by: Terrazas Angulo, German
Published: (2009)
by: Terrazas Angulo, German
Published: (2009)
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
by: Hani, Mohamed Khalil, et al.
Published: (2000)
by: Hani, Mohamed Khalil, et al.
Published: (2000)
Performance of solid and cellular structured fly ash geopolymers exposed to a simulated fire
by: Rickard, William, et al.
Published: (2013)
by: Rickard, William, et al.
Published: (2013)
Relationship between acceptance of smartphones and its influence on users’ behavior among university’s students
by: Soo, Poh Lee
Published: (2016)
by: Soo, Poh Lee
Published: (2016)
A cellular neural network for robot path planning
by: Zhong, Yongmin, et al.
Published: (2007)
by: Zhong, Yongmin, et al.
Published: (2007)
Cellular acidification as a new approach to cancer treatment and to the understanding and therapeutics of neurodegenerative diseases
by: Harguindey, Salvador, et al.
Published: (2017)
by: Harguindey, Salvador, et al.
Published: (2017)
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
by: Ahmed, Shakil
Published: (2013)
by: Ahmed, Shakil
Published: (2013)
Integration of scientific experimental data through ontology approach: a review
by: Azram, Nur Adila, et al.
Published: (2016)
by: Azram, Nur Adila, et al.
Published: (2016)
Siri Nokia E untuk multimedia
Published: (2008)
Published: (2008)
Teknologi Nokia pantas mendepani masa
Published: (2008)
Published: (2008)
Ciri-ciri Nokia 6110 Navigator
Published: (2008)
Published: (2008)
Enhanced normalization approach to address stop-word complexity in compound-word schema labels
by: Hossain, Jafreen
Published: (2014)
by: Hossain, Jafreen
Published: (2014)
Monitoring and Prediction of Land-Use and Land-Cover (LULC) Change
by: Corner, Robert Jonathan, et al.
Published: (2013)
by: Corner, Robert Jonathan, et al.
Published: (2013)
Similar Items
-
Cellular Automata-based Algorithm for Liquid Diffusion Phenomenon Modeling using imaging technique
by: Al-Ghaili, Abbas Mohammed Ali
Published: (2013) -
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
by: Hamdi, Ayman Majid
Published: (2019) -
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008) -
Lightweight verification and fine-grained access control in named data networking based on schnorr signature and hash functions
by: Wu, Shanglun, et al.
Published: (2021) -
Understanding the evolution of superalloy microstructure during inertia friction welding using in-situ x-ray diffraction and cellular automata
by: Rowson, Matthew
Published: (2021)