検索結果 4 件

デジタル記事
許, 容碩, 櫻井, 幸一International Workshop on Information & Electrical Engineering2002-05Proc. of International Workshop on Information & Electrical Engineering1p.168-173
インターネットで読める全国の図書館
  • 件名Informatics Cryptography Information-Security Hash function Digital signature Authentication Integrity HAS SHA MD...
デジタル記事
2002-05Proc. of International Workshop on Information & Electrical Engineering1p.168-173
インターネットで読める全国の図書館
  • 要約等Hash functions play an impor...... a branch of information secret. The hash algorithm provides the services of information security, authentication, inte......non-reputation and so on. As the growth of comp...... technologies, the hash value has been......onger based on the complexity of ......desirable that the output lengths of hash functions are more than 160 bits. The 1st edition of Hash Function Standard–160 of Kore......lished in 1998 and the revised editio......er, we propose the three improved hash functions. First, we pr......e HAS-256, 384 and 512 that were ......n SHA-256, 384 and 512. Second, w......proposed a new hash function with variable output...
  • 件名Informatics Cryptography Information-Security Hash function Digital signature Authentication Integrity HAS SHA MD...
  • 出版者(掲載誌)International Workshop on Information & Electrical Engineerin...

検索結果は以上です。