SHA Encryption System
In the world of information technology, cryptography is a must for hiding the real meaning of information from unauthorized users. Secure Hash Standards are commonly used in generating digital signature. SHA-1 and SHA-256 are algorithms specified in Secure Hash Standard. SHA-1and SHA-256...
Saved in:
| Main Author: | |
|---|---|
| Format: | Monograph |
| Published: |
UTeM
2010
|
| Subjects: | |
| Online Access: | http://library.utem.edu.my:8000/elmu/index.jsp?module=webopac-d&action=fullDisplayRetriever.jsp&szMaterialNo=0000063249 http://library.utem.edu.my:8000/elmu/index.jsp?module=webopac-d&action=fullDisplayRetriever.jsp&szMaterialNo=0000063249 http://eprints.utem.edu.my/2491/1/Sha_Encryption_System_Tan_Su_Ning_QA76.9.A25.T38_2010_-_24_pages.pdf http://eprints.utem.edu.my/2491/2/Sha_Encryption_System_Tan_Su_Ning_QA76.9.A25.T38_2010.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!