STITCH-256: A dedicated cryptographic hash function
Hash functions are an impodant cryptographc primitive in a wide range of applicatiom, such as message authentication and digital signatures. Among others, Message Digest (MD)-415, Secure Hashing Algorithm (SHA)-OI1R and RACE Integrity Primitives Evaluation Message Digest (RIPEMD) family are examples...
Saved in:
Main Authors: | Jamil N., Mahmod R., Z'aba M.R., Udzir N.I., Zukarnain Z.A. |
---|---|
Other Authors: | 36682671900 |
Format: | Article |
Published: |
2023
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Diffusion and statistical analysis of STITCH-256
by: Jamil N., et al.
Published: (2023) -
An observation of cryptographic properties of 256 one-dimensional cellular automata rules
by: Jamil N., et al.
Published: (2023) -
The development of hashing indexing technique in case retrieval
by: M.F.M., Mohsin,, et al.
Published: (2015) -
Cellular automata based user authentication scheme using identity-bits commitment for Wireless Sensor Network
by: Jamil N., et al.
Published: (2023) -
Low-cost synthesis approach for reversible authenticator circuits in QCA environment
by: Bhoi, Bandan, et al.
Published: (2019)