Now showing items 1-4 of 4

    • Algorithm construction of HLI hash function 

      Estuningsih, Rachmawati Dwi | Guritman, Sugi | Silalahi, Bib P. (2014)
      Hash function based on lattices believed to have a strong security proof based on the worst-case hardness, In 2008. Lyubashevsky et al. proposed WSIFFT, aa hash function that corresponds to a simple expresion over modular ...
    • Algorithm Construction of HLI Hash Function 

      Estuningsih, Rachmawati Dwi | Guritman, Sugi | Silalahi, Bib Paruhum (2014)
      Cryptography is a study of mathematical techniques related to aspects of information security regarding on confidentiality, data integrity, entity authentication, and data origin authentication. Data integrity is a service, ...
    • Algorithm Construction of HLI Hash Function 

      Estuningsih, Rachmawati Dwi | Guritman, Sugi | Silalahi, Bib Paruhum (2014)
      Cryptography is a study of mathematical techniques related to aspects of information security regarding on confidentiality, data integrity, entity authentication, and data origin authentication. Data integrity is a service, ...
    • Kontruksi algoritme fungsi hash HLI 

      Estuningsih, Rachmawati Dwi | Guritman, Sugi | Silalahi, Bib Paruhum (2014)
      Cryptography is a study of mathematical techniques related to aspects of information security regarding on confidentiality, data integrity, entity authentication, and data origin authentication. Data integrity is a service, ...