Research Article

Citations for "Encryption Algorithm of RSH (Round Sheep Hash)"

Citation to this article as recorded by ASCI logo

Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Compiler optimization and plain text pre-processing to hoist the height of HIGHT in AVR platform. Res. J. Inform. Technol., 6: 356-367.
CrossRef  |  Direct Link  |  

Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Firmware for data security: A review. Res. J. Inform. Technol., 4: 61-72.
CrossRef  |  Direct Link  |  

Reaz, M.B.I., Md. S. Amin, F.H. Hashim and K. Asaduzzaman, 2011. Single core hardware module to implement partial encryption of compressed image. Am. J. Applied Sci., 8: 566-573.
CrossRef  |  

Tang, J. and L. Wang, 2013. An improved rijndael encryption algorithm based on niosii. Inf. Technol. J., 12: 1434-1438.
CrossRef  |  Direct Link  |  

Citation to this article as recorded by Crossref logo

Firmware for Data Security: A Review
Research Journal of Information Technology Vol. 4, Issue 3, 61, 2012

Related Articles in ASCI
Search in Google Scholar
View Citation
Report Citation

©  2022 Science Alert. All Rights Reserved