Research Article

Citations for "Secure Implementation of Message Digest, Authentication and Digital Signature"

Citation to this article as recorded by ASCI logo

Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Compiler optimization and plain text pre-processing to hoist the height of HIGHT in AVR platform. Res. J. Inform. Technol., 6: 356-367.
CrossRef  |  Direct Link  |  

Janakiraman, S., K.V.S.K. Kumar, R.R.K. Reddy, A. Srinivasulu, R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Humming bird with coloured wings: A feedback security approach. Inform. Technol. J., 13: 2022-2026.
CrossRef  |  Direct Link  |  

Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Firmware for data security: A review. Res. J. Inform. Technol., 4: 61-72.
CrossRef  |  Direct Link  |  

Liu, C., Y. Zhou, Y. Xiao and G. Sun, 2011. Encryption algorithm of RSH (round sheep hash). Inform. Technol. J., 10: 686-690.
CrossRef  |  Direct Link  |  

Raajan, N.R., A.J. Philomina, M. Ramkumar, G.N. Jayabhavani and C. Nishanthini, 2013. Hash encrypted synchronized OFDM. Res. J. Inform. Technol., 5: 218-225.
CrossRef  |  Direct Link  |  

Rabah, K., 2006. Review of methods for integer factorization applied to cryptography. J. Applied Sci., 6: 458-481.
CrossRef  |  Direct Link  |  

Tan, L. and X. Sun, 2011. Robust text hashing for content-based document authentication. Inform. Technol. J., 10: 1608-1613.
CrossRef  |  

Citation to this article as recorded by Crossref logo

Innovations in Electrical and Electronic Engineering
Lecture Notes in Electrical Engineering

An Empirical Evaluation of Various Digital Signature Scheme in Wireless Sensor Network
IETE Technical Review

Robust Text Hashing for Content-Based Document Authentication
Information Technology Journal Vol. 10, Issue 8, 1608, 2011

Encryption Algorithm of RSH (Round Sheep Hash)
Information Technology Journal Vol. 10, Issue 3, 686, 2011

Review of Methods for Integer Factorization Applied to Cryptography
Journal of Applied Sciences Vol. 6, Issue 2, 458, 2006

Firmware for Data Security: A Review
Research Journal of Information Technology Vol. 4, Issue 3, 61, 2012

Related Articles in ASCI
Search in Google Scholar
View Citation
Report Citation

©  2022 Science Alert. All Rights Reserved