Secure Hash Algorithm
An Efficient Approach for Secure Hash Algorithm
6
Secure Hash Algorithm-2 formed on DNA
20
Title: IMPLEMENTATION OF SECURE HASH ALGORITHM SHA-1 BY LABVIEW
7
Data De Duplication Using SHA (Secure Hash Algorithm)
5
Android Mobile Security using Secure Hash Algorithm
7
Implementation of Secure Hash Algorithm Using JAVA Programming
6
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
6
Implementation of Secure Hash Algorithm1 for High Throughput and Optimized Performance
10
Secure digital signature schemes based on hash functions
5
An Implementation of MD5 Hash Algorithm for RFID Tags
7
Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF
57
HASH be a hash function.
6
A survey paper on Secure Hash Based Distributed De-duplication Systems
5
Public Inspect For Secure Cloud Storage Based On Dynamic-Hash-Table
7
For Secure Cloud Storage of dynamic-Hash-Table based On Public Auditing
7
Design and Analysis of a New Hash Algorithm with Key Integration
6
Secure data transaction in the cloud using Steganography and Merkle Hash Tree
6
Secure Cloud Storage By Dynamic-Hash-Table Based Public Auditing
6
Short and Secure CLS Pattern Using Simple Crypto Analysis Hash Technique
5
DRINA: A SECURE CLUSTERING ALGORITHM
8