Please use this identifier to cite or link to this item: http://repository.ipb.ac.id/handle/123456789/81105
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGuritman, Sugi-
dc.contributor.authorAliatiningtyas, Nur-
dc.contributor.authorWulandari, Teduh-
dc.contributor.authorIlyas, Muhammad-
dc.date.accessioned2016-06-30T03:43:25Z-
dc.date.available2016-06-30T03:43:25Z-
dc.date.issued2015-
dc.identifier.issn0972-5555-
dc.identifier.urihttp://repository.ipb.ac.id/handle/123456789/81105-
dc.description.abstractCryptographic hash function is a function h : D -> R with | D | >> | R | which has the security properties: one-way (computationally not feasible to calculate x e D from known y e R so that y = h(x)) and collision resistant (not feasible determining x =/ y so that h(x) = h(y)).id
dc.language.isoidid
dc.publisherPushpa Publishing House, Allahabad, Indiaid
dc.relation.ispartofseriesVolume 36, Number 2;Pages 177-188-
dc.titleConstruction of family of hash functions based on ideal latticeid
dc.typeArticleid
Appears in Collections:Faculty of Mathematics and Natural Sciences

Files in This Item:
File SizeFormat 
JPANTAApr2015_177_188.pdf86.47 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.