HMNT: hash function based on new Mersenne number transform
In the field of information security, hash functions are considered important as they are used to ensure message integrity and authentication. Despite various available methods to design hash functions, the methods have been proven to time inefficient and have security flaws (such as a lack of colli...
Main Authors: | Maetouq, Ali (Author), Mohd. Daud, Salwani (Author) |
---|---|
Format: | Article |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers Inc.,
2020-04.
|
Subjects: | |
Online Access: | Get fulltext |
Similar Items
-
Mercerization optimization of bamboo (Bambusa vulgaris) fiber-reinforced epoxy composite structures using a Box-Behnken design
by: Hassan, Mohamad Zaki, et al.
Published: (2020) -
Improved watermarking scheme based on best color channel selection using discrete slantlet transform
by: Adnan, Myasar Mundher
Published: (2013) -
Characterization of thulium-doped fiber as active gain medium at 2000 nanometer wavelength region
by: Mohd. Sharif, Nurhanis
Published: (2017) -
Information security management metrics in web application
by: Abd. Rahim, Mohd. Hafiz
Published: (2013) -
Exploiting 2-dimensional source correlation in channel decoding with parameter estimation for unknown source
by: Mohd. Nor, Muhammad Izzat Amir
Published: (2018)