Show simple item record

dc.contributor.authorGuritman, Sugi
dc.contributor.authorAliatiningtyas, Nur
dc.contributor.authorWulandari, Teduh
dc.contributor.authorIlyas, Muhammad
dc.date.accessioned2016-06-30T03:43:25Z
dc.date.available2016-06-30T03:43:25Z
dc.date.issued2015
dc.identifier.issn0972-5555
dc.identifier.urihttp://repository.ipb.ac.id/handle/123456789/81105
dc.description.abstractCryptographic hash function is a function h : D -> R with | D | >> | R | which has the security properties: one-way (computationally not feasible to calculate x e D from known y e R so that y = h(x)) and collision resistant (not feasible determining x =/ y so that h(x) = h(y)).id
dc.language.isoidid
dc.publisherPushpa Publishing House, Allahabad, Indiaid
dc.relation.ispartofseriesVolume 36, Number 2;Pages 177-188
dc.titleConstruction of family of hash functions based on ideal latticeid
dc.typeArticleid


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record