Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "07672844-eb85-46e9-96b3-63cd1924029f"}, "_deposit": {"created_by": 71, "id": "6859", "owner": "71", "owners": [71], "owners_ext": {"displayname": "Kay_Thwe", "username": "kay_thwe"}, "pid": {"revision_id": 0, "type": "depid", "value": "6859"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/00006859", "sets": ["user-miit"]}, "communities": ["miit"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "On the Security of hash function", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Crypto graphic hash functions are an important building block for a wide range of applications such as the authentication of information and digital signatures. In this paper we give special emphasis on the design and security of the standard hash functions."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Hash functions"}, {"interim": "Design"}, {"interim": "Security"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-12-16"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "On the security of hash function.pdf", "filesize": [{"value": "132 KB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "mimetype": "application/pdf", "size": 132000.0, "url": {"url": "https://meral.edu.mm/record/6859/files/On the security of hash function.pdf"}, "version_id": "8b42863b-6bb2-49ed-b9a2-01ce9ae4ad5d"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "WCSET", "subitem_c_date": "27-02-2009", "subitem_conference_title": "World Congress on  Science, Engineering and Technology", "subitem_place": "Penang, Malaysia", "subitem_website": "www.waset.org"}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Myo Myo Aung"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-02-27"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "www.waset.org"}, "item_title": "On the Security of hash function", "item_type_id": "21", "owner": "71", "path": ["1582963674932", "1597397207532"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000006859", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-12-16"}, "publish_date": "2020-12-16", "publish_status": "0", "recid": "6859", "relation": {}, "relation_version_is_last": true, "title": ["On the Security of hash function"], "weko_shared_id": -1}
  1. Myanmar Institute of Information Technology
  1. Myanmar Institute of Information Technology
  2. Department of Natural Science

On the Security of hash function

http://hdl.handle.net/20.500.12678/0000006859
http://hdl.handle.net/20.500.12678/0000006859
907da2dd-4264-487a-bf95-74d389ba0ab3
07672844-eb85-46e9-96b3-63cd1924029f
None
Preview
Name / File License Actions
On On the security of hash function.pdf (132 KB)
Publication type
Conference paper
Upload type
Publication
Title
Title On the Security of hash function
Language en
Publication date 2009-02-27
Authors
Myo Myo Aung
Description
Crypto graphic hash functions are an important building block for a wide range of applications such as the authentication of information and digital signatures. In this paper we give special emphasis on the design and security of the standard hash functions.
Keywords
Hash functions, Design, Security
Identifier www.waset.org
Conference papers
WCSET
27-02-2009
World Congress on Science, Engineering and Technology
Penang, Malaysia
www.waset.org
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-12-16 03:02:34.542134
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL