HMNT: hash function based on new Mersenne number transform
In the field of information security, hash functions are considered important as they are used to ensure message integrity and authentication. Despite various available methods to design hash functions, the methods have been proven to time inefficient and have security flaws (such as a lack of colli...
Saved in:
Main Authors: | Maetouq, Ali, Mohd. Daud, Salwani |
---|---|
Format: | Article |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2020
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/92212/1/SalwaniMohdDaud2020_HMNTHashFunctionBasedonNew.pdf http://eprints.utm.my/id/eprint/92212/ http://dx.doi.org/10.1109/ACCESS.2020.2989820 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Enhancing the security of RCIA ultra-lightweight
authentication protocol by using random number generator (RNG) technique
by: Yasear, Shaymah Akram
Published: (2015) -
Vehicle mobile detection in a building parking area using smart-phone bluetooth signal technology
by: Mohd. Daud, Salwani, et al.
Published: (2015) -
Improved watermarking scheme based on best color channel selection using discrete slantlet transform
by: Adnan, Myasar Mundher
Published: (2013) -
Data Transformation Model For Addressing Incomplete And Inconsistent Quality Issues Of Big Data
by: Onyeabor, Grace Amina
Published: (2024) -
Transformational and Transactional Leadership on Information Communication Technology (ICT) Implementation in UUM an International UUM Postgraduate Perspectives
by: Dakhil, Mohamed Hamed
Published: (2008)