{"created":"2020-09-01T10:03:34.509162+00:00","id":3388,"links":{},"metadata":{"_buckets":{"deposit":"c204bfc7-d1d3-4fbe-8274-13cf967da540"},"_deposit":{"id":"3388","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3388"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3388","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Implementation of MDC-2 with AES-hash Function","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Cryptographic hash functions are a third type of cryptographic algorithm. They take a message of any length as input, and output a short, fixed length hash which can be used in (for example) a digital signature. As digital signature technology becomes more widely understood and utilized, many countries worldwide are competitively developed their own signature standards for their use and applications. Hash functions are the mathematical algorithms that transform arbitrary length sequences of bits into a hash result of a fixed, limited length. And they are used in many cryptographic protocols. Currently, hash functions based on block cipher used in many of the cryptographic applications. This paper will propose a hash function which is based on AES algorithm and it is the modified version of MDC-2 algorithm to perform efficiently the iteration of compression function for message with huge length."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"hash function"},{"interim":"AES"},{"interim":"DES"},{"interim":"MDC-2"},{"interim":"message digest"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-22"}],"displaytype":"preview","filename":"psc2010paper (205).pdf","filesize":[{"value":"443 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3388/files/psc2010paper (205).pdf"},"version_id":"5423f258-c620-40c7-b806-13c64d9f85e2"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fifth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Myat, Nway Htet"},{"subitem_authors_fullname":"Win, Myat Su"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2010-12-16"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1144"},"item_title":"Implementation of MDC-2 with AES-hash Function","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-22","publish_status":"0","recid":"3388","relation_version_is_last":true,"title":["Implementation of MDC-2 with AES-hash Function"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T06:05:26.088920+00:00"}