Comparison and analysis study of sha-3 finallists
The competition of the NIST contenders in SHA-3 increased between the candidates hash functions to choose the winner in the end of 2012. However, NIST has outlined different requirements to measure different hash functions criteria such as; security, structure, and performance. Therefore, this paper...
Main Authors: | Taha, Imad, Alahmad, Mohammad, Munther, Khansaa |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2012
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/28030/ http://irep.iium.edu.my/28030/ http://irep.iium.edu.my/28030/4/ieee-imad-m.pdf |
Similar Items
-
Hash function of finalist SHA-3: analysis study
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013) -
Protection of text using SHA1 and Base64
by: Taha, Imad, et al.
Published: (2012) -
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014) -
SVG and Arabic font challenges and improvements
by: Taha, Imad, et al.
Published: (2013) -
Colour Image Steganography Using SHA-512 and Lossless Compression
by: Ng, Ke-Huey, et al.
Published: (2018)