Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method
by
Hłobaż, Artur
in
Algorithms
/ Competition
/ Cryptography
/ Data encryption
/ Data exchange
/ data security
/ Digital signatures
/ end-to-end data security
/ Hash based algorithms
/ sdex method
/ secure communication
/ secure data exchange method
/ secure transmission
/ Software
2022
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method
by
Hłobaż, Artur
in
Algorithms
/ Competition
/ Cryptography
/ Data encryption
/ Data exchange
/ data security
/ Digital signatures
/ end-to-end data security
/ Hash based algorithms
/ sdex method
/ secure communication
/ secure data exchange method
/ secure transmission
/ Software
2022
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method
by
Hłobaż, Artur
in
Algorithms
/ Competition
/ Cryptography
/ Data encryption
/ Data exchange
/ data security
/ Digital signatures
/ end-to-end data security
/ Hash based algorithms
/ sdex method
/ secure communication
/ secure data exchange method
/ secure transmission
/ Software
2022
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method
Journal Article
Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method
2022
Request Book From Autostore
and Choose the Collection Method
Overview
The paper presents analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method. The group of these functions will include the finalists of the SHA-3 competition, i.e. BLAKE, Grøstl, JH, Keccak, Skein. The aim of the analysis is to develop more secure and faster cryptographic algorithm compared to the current version of the SDEx method with SHA- 512 and the AES algorithm. When considering the speed of algorithms, mainly the software implementation will be taken into account, as it is the most commonly used.
Publisher
Polish Academy of Sciences
This website uses cookies to ensure you get the best experience on our website.