Citation to this article as recorded by
Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Compiler optimization and plain text pre-processing to hoist the height of HIGHT in AVR platform. Res. J. Inform. Technol., 6: 356-367. CrossRefDirect Link |
Janakiraman, S., K.V.S.K. Kumar, R.R.K. Reddy, A. Srinivasulu, R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Humming bird with coloured wings: A feedback security approach. Inform. Technol. J., 13: 2022-2026. CrossRefDirect Link |
Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Firmware for data security: A review. Res. J. Inform. Technol., 4: 61-72. CrossRefDirect Link |
Liu, C., Y. Zhou, Y. Xiao and G. Sun, 2011. Encryption algorithm of RSH (round sheep hash). Inform. Technol. J., 10: 686-690. CrossRefDirect Link |
Raajan, N.R., A.J. Philomina, M. Ramkumar, G.N. Jayabhavani and C. Nishanthini, 2013. Hash encrypted synchronized OFDM. Res. J. Inform. Technol., 5: 218-225. CrossRefDirect Link |
Rabah, K., 2006. Review of methods for integer factorization applied to cryptography. J. Applied Sci., 6: 458-481. CrossRefDirect Link |
Tan, L. and X. Sun, 2011. Robust text hashing for content-based document authentication. Inform. Technol. J., 10: 1608-1613. CrossRef |
Citation to this article as recorded by
Innovations in Electrical and Electronic Engineering Lecture Notes in Electrical Engineering |
An Empirical Evaluation of Various Digital Signature Scheme in Wireless Sensor Network IETE Technical Review |
Robust Text Hashing for Content-Based Document Authentication Information Technology Journal Vol. 10, Issue 8, 1608, 2011 |
Encryption Algorithm of RSH (Round Sheep Hash) Information Technology Journal Vol. 10, Issue 3, 686, 2011 |
Review of Methods for Integer Factorization Applied to Cryptography Journal of Applied Sciences Vol. 6, Issue 2, 458, 2006 |
Firmware for Data Security: A Review Research Journal of Information Technology Vol. 4, Issue 3, 61, 2012 |
How to cite this article
Kefa Rabah , 2005. Secure Implementation of Message Digest, Authentication and Digital Signature. Information Technology Journal, 4: 204-221.
DOI: 10.3923/itj.2005.204.221
URL: https://scialert.net/abstract/?doi=itj.2005.204.221
DOI: 10.3923/itj.2005.204.221
URL: https://scialert.net/abstract/?doi=itj.2005.204.221