ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: Abstract: Hash functions are the most widespread among all cr yptographic primitives
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes
Abstract: Hash functions are the most widespread among all cr yptographic primitives, and are currently used in multiple
#Data integrity
# hash algorithm
# digital signature
# pre(image
# message digest
# message authentication
A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes
Abstract: Hash functions are the most widespread among all cr yptographic primitives, and are currently used in multiple
#Data integrity
# hash algorithm
# digital signature
# pre(image
# message digest
# message authentication
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint