Evolution and analysis of secure hash algorithm (SHA) family

With the rapid advancement of technologies and proliferation of intelligent devices, connecting to the internet challenges have grown manifold, such as ensuring communication security and keeping user credentials secret. Data integrity and user privacy have become crucial concerns in any ecosystem o...

Full description

Saved in:
Bibliographic Details
Main Authors: Khan, Burhan Ul Islam, Olanrewaju, Rashidah Funke, Morshidi, Malik Arman, Mir, Roohie Naaz, Mat Kiah, Miss Laiha, Khan, Abdul Mobeen
Format: Article
Published: 2022
Subjects:
Online Access:http://eprints.um.edu.my/41785/
Tags: Add Tag
No Tags, Be the first to tag this record!