Hash function of finalist SHA-3: analysis study
The National Institute of Standard and Technology (NIST) has suggested different principles for hash functions to avoid the blunders and to choice the ideal quality of hash function, which to be a measurement for the future of hash function generations. Therefore, the goal of the NIST contenders i...
| Main Authors: | Alshaikhli, Imad Fakhri Taha, Alahmad, Mohammad A., Munthir, Khansaa | 
|---|---|
| Format: | Article | 
| Language: | English | 
| Published: | 
        
      Helvetic Editions LTD, Switzerland    
    
      2013
     | 
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/30096/ http://irep.iium.edu.my/30096/ http://irep.iium.edu.my/30096/1/Hash-Function-of-Finalist-SHA-3-Analysis-Study%281%29.pdf  | 
Similar Items
- 
                
        
          Comparison and analysis study of sha-3 finallists        
                  
by: Taha, Imad, et al.
Published: (2012) - 
                
        
          Broad view of cryptographic hash functions        
                  
by: Alahmad, Mohammad, et al.
Published: (2013) - 
                
        
          Design and analysis of a new hash function gear        
                  
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014) - 
                
        
          MOIM: a novel design of cryptographic hash function        
                  
by: Alahmad, Mohammad, et al.
Published: (2013) - 
                
        
          Protection of the digital holy Quran using SAB hash function        
                  
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)