Citation to this article as recorded by
Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Compiler optimization and plain text pre-processing to hoist the height of HIGHT in AVR platform. Res. J. Inform. Technol., 6: 356-367. CrossRefDirect Link |
Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Firmware for data security: A review. Res. J. Inform. Technol., 4: 61-72. CrossRefDirect Link |
Reaz, M.B.I., Md. S. Amin, F.H. Hashim and K. Asaduzzaman, 2011. Single core hardware module to implement partial encryption of compressed image. Am. J. Applied Sci., 8: 566-573. CrossRef |
Tang, J. and L. Wang, 2013. An improved rijndael encryption algorithm based on niosii. Inf. Technol. J., 12: 1434-1438. CrossRefDirect Link |
Citation to this article as recorded by
Firmware for Data Security: A Review Research Journal of Information Technology Vol. 4, Issue 3, 61, 2012 |
How to cite this article
Chaoqun Liu, Yang Zhou, Yunhua Xiao and Guang Sun, 2011. Encryption Algorithm of RSH (Round Sheep Hash). Information Technology Journal, 10: 686-690.
DOI: 10.3923/itj.2011.686.690
URL: https://scialert.net/abstract/?doi=itj.2011.686.690
DOI: 10.3923/itj.2011.686.690
URL: https://scialert.net/abstract/?doi=itj.2011.686.690