<style>.perfmatters-lazy[data-src]{display:none!important}</style>

Cryptographic Algorithms and Protocols

Author: Mohammad Khalid Imam Rahmani

*Wait a few seconds for the document to load, the time may vary depending on your internet connection. If you prefer, you can download the file by clicking on the link below.

Download

This may interest you

Design and analysis of cryptographic algorithms

Kolbl, Stefan

Implementation of cryptographic algorithms and protocols

Omkar Guru, Sanjay Majumdar and Krithika K

Introduction to the hash function as a personal data pseudonymisation technique

AEPD

Cryptographic hash functions - an overview

Bart Preneel

Cryptographic Hash Functions

Kelvin W. Macharia