To search, Click below search items.

 

All Published Papers Search Service

Results for SHA-2; Total 3

Title

A Secure Hash Algorithm with only 8 Folded SHA-1 Steps

Author

Danilo Gligoroski, Smile Markovski, Svein J. Knapskog

Citation

Vol. 6  No. 10  pp. 194-205

Keywords

SHA-1, SHA-2, hash, quasigroup folding


Title

An Approach for Enhancing Security of Cloud Data using Cryptography and Steganography with E-LSB Encoding Technique

Author

Mohammad Obaidur Rahman, Muhammad Kamal Hossen, Golam Morsad, Animesh Chandra Roy, and Shahnur Azad Chowdhury

Citation

Vol. 18  No. 9  pp. 85-93

Keywords

Cloud data storage, Steganography, Blowfish, Embedded Least Significant Bits (E-LSB), SHA-256


Title

Application of Blockchain Technology to Guarantee the Integrity and Transparency of Documents

Author

Khuat Thanh Son, Nguyen Truong Thang, Le Phe Do, and Tran Manh Dong

Citation

Vol. 18  No. 12  pp. 7-15

Keywords

Blockchain, hash table, peer networks, game theory, digital signatures, cryptography, ECDSA, SHA-265, documentation.


[1]