Protection of the digital holy Quran using SAB hash function
Cryptography consists of a set of algorithms and techniques to convert the data into another form so that the contents are unreadable and unexplainable to anyone who does not have the authority to read or write on these data. One of the tools used by cryptography is the hash function. The hash funct...
Main Authors: | Alshaikhli, Imad Fakhri Taha, Alahmad, Mohammad |
---|---|
Format: | Conference or Workshop Item |
Language: | English English English |
Published: |
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/30607/ http://irep.iium.edu.my/30607/ http://irep.iium.edu.my/30607/2/Table_of_Content.pdf http://irep.iium.edu.my/30607/3/53.pdf http://irep.iium.edu.my/30607/4/certificate_%28Dr__Imad_Fakhri%292013.pdf |
Similar Items
-
Protection of the digital Holy Quran hash digest by using cryptography algorithms
by: Alahmad, Mohammad, et al.
Published: (2013) -
Protection of the digital holy Quran using IT techniques
by: Alahmad, Mohammad, et al.
Published: (2017) -
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013) -
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013) -
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)