LTCHA: LIGHT-WEIGHT TWO-WAY CRYPTOGRAPHIC HASH ALGORITHM FOR CLOUD
The cryptographic hash algorithms play a significant role in preserving the data security in the wireless networks. The most frequently used hash algorithms such as Message Digest (MD5) and Secure Hash Algorithm (SHA1) need high computational overhead. The energy-starved network does not afford such...
Main Authors: | V. VASANTHI, M. CHIDAMBARAM |
---|---|
Format: | Article |
Language: | English |
Published: |
Taylor's University
2018-12-01
|
Series: | Journal of Engineering Science and Technology |
Subjects: | |
Online Access: | http://jestec.taylors.edu.my/Vol%2013%20issue%2012%20December%202018/13_12_27.pdf |
Similar Items
-
Analysis and implementation of cryptographic hash functions in programmable logic devices / Kriptografinių maišos funkcijų įgyvendinimo programuojamosios logikos lustuose tyrimas
by: Tautvydas Brukštus
Published: (2016-06-01) -
Development of the Software Cryptographic Service Provider on the Basis of National Standards
by: Rakhmatillo Djuraevich Aloev, et al.
Published: (2019-02-01) -
ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITS
by: E. V. Listopad
Published: (2019-06-01) -
Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains
by: Jörg Keller, et al.
Published: (2021-01-01) -
JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS
by: Irada Rahimova, et al.
Published: (2019-12-01)