Now showing items 1-4 of 4

    • Algorithm Construction of HLI Hash Function 

      Estuningsih, Rachmawati Dwi | Guritman, Sugi | Silalahi, Bib Paruhum (2014)
      Cryptography is a study of mathematical techniques related to aspects of information security regarding on confidentiality, data integrity, entity authentication, and data origin authentication. Data integrity is a service, ...
    • Algorithm Construction of HLI Hash Function 

      Estuningsih, Rachmawati Dwi | Guritman, Sugi | Silalahi, Bib Paruhum (2014)
      Cryptography is a study of mathematical techniques related to aspects of information security regarding on confidentiality, data integrity, entity authentication, and data origin authentication. Data integrity is a service, ...
    • Analisis keamanan konstruksi fungsi hash berbasis sandi blok kunci simetrik (Kajian Teoritik) 

      Arafiah, Ria (2007)
      Hash function is used to secure the integrity and authenticity of a massege, so that the message is save. The message which will be secured, will be attached to hash/message digest/digital signature value fro, the message. ...
    • Kontruksi algoritme fungsi hash HLI 

      Estuningsih, Rachmawati Dwi | Guritman, Sugi | Silalahi, Bib Paruhum (2014)
      Cryptography is a study of mathematical techniques related to aspects of information security regarding on confidentiality, data integrity, entity authentication, and data origin authentication. Data integrity is a service, ...