{"created":"2020-12-16T02:57:43.133140+00:00","id":6859,"links":{},"metadata":{"_buckets":{"deposit":"07672844-eb85-46e9-96b3-63cd1924029f"},"_deposit":{"created_by":71,"id":"6859","owner":"71","owners":[71],"owners_ext":{"displayname":"Kay_Thwe","email":"kay_thwe_kywe_aye@miit.edu.mm","username":"kay_thwe"},"pid":{"revision_id":0,"type":"depid","value":"6859"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/00006859","sets":["1582963674932","1582963674932:1597397207532"]},"communities":["miit"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"On the Security of hash function","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Crypto graphic hash functions are an important building block for a wide range of applications such as the authentication of information and digital signatures. In this paper we give special emphasis on the design and security of the standard hash functions."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Hash functions"},{"interim":"Design"},{"interim":"Security"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2020-12-16"}],"displaytype":"preview","filename":"On the security of hash function.pdf","filesize":[{"value":"132 KB"}],"format":"application/pdf","url":{"url":"https://meral.edu.mm/record/6859/files/On the security of hash function.pdf"},"version_id":"8b42863b-6bb2-49ed-b9a2-01ce9ae4ad5d"}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"WCSET","subitem_c_date":"27-02-2009","subitem_conference_title":"World Congress on Science, Engineering and Technology","subitem_place":"Penang, Malaysia","subitem_website":"www.waset.org"}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Myo Myo Aung"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Conference paper"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-02-27"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"www.waset.org"},"item_title":"On the Security of hash function","item_type_id":"21","owner":"71","path":["1582963674932","1597397207532"],"publish_date":"2020-12-16","publish_status":"0","recid":"6859","relation_version_is_last":true,"title":["On the Security of hash function"],"weko_creator_id":"71","weko_shared_id":-1},"updated":"2021-12-13T07:45:27.436466+00:00"}