AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY
Recent advancements in the field of electronic commerce and internet banking have led to the growing need for a secure communication system. Various other areas including military require a highly reliable system so as to make sure that the shared data is confidential and unaltered.A negligence over...
Main Authors: | GURPREET K. SODHI, GURJOT S. GABA |
---|---|
Format: | Article |
Language: | English |
Published: |
Taylor's University
2018-03-01
|
Series: | Journal of Engineering Science and Technology |
Subjects: | |
Online Access: | http://jestec.taylors.edu.my/Vol%2013%20issue%203%20March%202018/13_3_17.pdf |
Similar Items
-
A COMPETENT MAC SCHEME DESIGNED USING A UNIQUE DNA-BRNG KEY AND A NOVEL HASH ALGORITHM
by: GURPREET K. SODHI, et al.
Published: (2018-02-01) -
The Message Authentication Code Based on Universal Hashing
by: T. A. Bilyk, et al.
Published: (2012-06-01) -
HMNT: Hash Function Based on New Mersenne Number Transform
by: Ali Maetouq, et al.
Published: (2020-01-01) -
Universal Hashing for Ultra-Low-Power Cryptographic Hardware Applications
by: Yuksel, Kaan
Published: (2004) -
DEVELOPMENT AND IMPLEMENTATION OF HASH FUNCTION FOR GENERATING HASHED MESSAGE
by: Amir Ghaeedi, et al.
Published: (2016-09-01)