Omega network hash construction
Cryptographic hash functions are very common and important cryptographic primitives. They are commonly used for data integrity checking and data authentication. Their architecture is based on the Merkle-Damgard construction, which takes in a variablelength input and produces a fixed-length hash v...
| Main Author: | Chuah, Chai Wen |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/3706/ http://eprints.uthm.edu.my/3706/1/24p%20CHUAH%20CHAI%20WEN.pdf |
Similar Items
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
New constructions of universal hash functions based on function sums
by: Khoo, , K, et al.
Published: (2006)
by: Khoo, , K, et al.
Published: (2006)
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004)
by: Ngo, , DCL, et al.
Published: (2004)
Gene regulatory network construction of ovarian cancer based on passing attributes between network for data assimilation
by: Yeo, Zhu Ern Isaac, et al.
Published: (2020)
by: Yeo, Zhu Ern Isaac, et al.
Published: (2020)
Cancellable biometrics and annotations on BioHash
by: TEOH, A, et al.
Published: (2008)
by: TEOH, A, et al.
Published: (2008)
PalmHashing: a novel approach for cancelable biometrics
by: Tee, Connie, et al.
Published: (2005)
by: Tee, Connie, et al.
Published: (2005)
Personalised cryptographic key generation based on FaceHashing
by: TEOH, A
Published: (2004)
by: TEOH, A
Published: (2004)
Parallel Geometric Hashing Algorithm For Protein Tertiary Structure.
by: Jaber, Khalid, et al.
Published: (2007)
by: Jaber, Khalid, et al.
Published: (2007)
Comparing the Performance of Predictive Models Constructed Using the Techniques of Feed-Forword and Generalized Regression Neural Networks
by: Ajiboye, Adeleke Raheem, et al.
Published: (2016)
by: Ajiboye, Adeleke Raheem, et al.
Published: (2016)
Remarks on BioHash and its mathematical foundation
by: TEOH, A, et al.
Published: (2006)
by: TEOH, A, et al.
Published: (2006)
The development of hashing indexing technique in case retrieval
by: Mohamad Mohsin, Mohamad Farhan, et al.
Published: (2010)
by: Mohamad Mohsin, Mohamad Farhan, et al.
Published: (2010)
Secret channel using video steganography
by: Lee, Kar Yee, et al.
Published: (2017)
by: Lee, Kar Yee, et al.
Published: (2017)
Fragile watermarking scheme based on SHA-256 hash function and mersenne twister for medical image authentication
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)
PalmHashing: A novel approach for dual-factor authentication
by: Tee, Connie, et al.
Published: (2004)
by: Tee, Connie, et al.
Published: (2004)
Join query enhancement processing (jqpro) with big rdf data on a distributed system using hashing-merge join technique
by: Nahla Mohammedelzein, Elawad Babiker
Published: (2021)
by: Nahla Mohammedelzein, Elawad Babiker
Published: (2021)
Enhancement Of Manchester Encoding Technique By Combining IT With A Hash Function
by: Hamarsheh, Mu'taz M. N.
Published: (2008)
by: Hamarsheh, Mu'taz M. N.
Published: (2008)
Multiple hashes of single key with passcode for multiple accounts
by: Lee, Kok-wah, et al.
Published: (2007)
by: Lee, Kok-wah, et al.
Published: (2007)
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Remarks on BioHashing based cancelable biometrics in verification system
by: JIN, A, et al.
Published: (2006)
by: JIN, A, et al.
Published: (2006)
Cryptanalaysia Of SVD & DWT Based Watermarking Schemes
by: Ting, Chai-Wen
Published: (2007)
by: Ting, Chai-Wen
Published: (2007)
A Developed Network Layer Handover Based Wireless Networks
by: Sadiq, Ali Safa, et al.
Published: (2015)
by: Sadiq, Ali Safa, et al.
Published: (2015)
Image Steganography Using Hash Function And Compression
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
by: Ahmad Sulaiman, Zurkifli
Published: (2023)
A review of artificial intelligence strategies in covering array construction
by: Sughan Nair, Prabhakaran, et al.
Published: (2016)
by: Sughan Nair, Prabhakaran, et al.
Published: (2016)
Fuzzy methodologies for automated University timetabling solution construction and evaluation
by: Asmuni, Hishammuddin
Published: (2008)
by: Asmuni, Hishammuddin
Published: (2008)
JQPro : Join query processing in a distributed system for big RDF data using the hash-merge join technique
by: Elzein, Nahla Mohammed, et al.
Published: (2023)
by: Elzein, Nahla Mohammed, et al.
Published: (2023)
Enhancement of multicast network security
by: Ali, Sellami, et al.
Published: (2013)
by: Ali, Sellami, et al.
Published: (2013)
BSE enterprise network system
by: Amir, Azman
Published: (2014)
by: Amir, Azman
Published: (2014)
An investigation of fuzzy multiple heuristic orderings in the construction of university examination timetables
by: Asmuni, Hishammuddin, et al.
Published: (2009)
by: Asmuni, Hishammuddin, et al.
Published: (2009)
Evolutionary-based feature construction with substitution for data summarization using DARA
by: Sia, Florence, et al.
Published: (2012)
by: Sia, Florence, et al.
Published: (2012)
Information structure framework for ISMS planning and certification: Malaysian data
by: Shamala, Palaniappan, et al.
Published: (2018)
by: Shamala, Palaniappan, et al.
Published: (2018)
Utilizing the roulette wheel based social network search algorithm for substitution box construction and optimization
by: Kamal Z., Zamli, et al.
Published: (2023)
by: Kamal Z., Zamli, et al.
Published: (2023)
Fault detection using neural network
by: Dinie, Muhammad
Published: (2008)
by: Dinie, Muhammad
Published: (2008)
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018)
by: M. S. A., Noman Ranak, et al.
Published: (2018)
Construction of prioritized t-way test suite using Bi-objective Dragonfly Algorithm
by: Ahmed, Mashuk, et al.
Published: (2022)
by: Ahmed, Mashuk, et al.
Published: (2022)
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Cryptographic hash function: a high level view
by: Taha, Imad, et al.
Published: (2015)
by: Taha, Imad, et al.
Published: (2015)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
A new design of cryptographic hash function: gear
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
by: Alkandari, Abdulaziz M, et al.
Published: (2015)
Similar Items
-
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019) -
New constructions of universal hash functions based on function sums
by: Khoo, , K, et al.
Published: (2006) -
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004) -
Gene regulatory network construction of ovarian cancer based on passing attributes between network for data assimilation
by: Yeo, Zhu Ern Isaac, et al.
Published: (2020) -
Cancellable biometrics and annotations on BioHash
by: TEOH, A, et al.
Published: (2008)