ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: hash algorithm
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Cyber Threat Defense in Power Grids: Introducing the Grid-Lock Secure-Chain Consensus Framework
Rashi Saxena,Lalitha Kumari
#Blockchain
#cyber threats
#proof of vote
#smart grid
#security
#consensus mechanism
A Highly Parallelizable Hash Algorithm Based on Latin Cubes
Ming Xu
#Hash algorithm
#latin cubes
#3D attribute
#parallelism
Finger Knuckle Print Authentication Using AES
1
#
A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes
Abstract: Hash functions are the most widespread among all cr yptographic primitives, and are currently used in multiple
#Data integrity
# hash algorithm
# digital signature
# pre(image
# message digest
# message authentication
A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes
Abstract: Hash functions are the most widespread among all cr yptographic primitives, and are currently used in multiple
#Data integrity
# hash algorithm
# digital signature
# pre(image
# message digest
# message authentication
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint