Found: 12 resources
A VHDL Model for Implementation of MD5 Hash Algorithm
Engineering and Technology Journal, 2013, Volume 31, Issue 6 Part (A) Engineering, Pages 1107-1116
Message Authentication Using New Hash Function
Al-Nahrain Journal of Science, 2016, Volume 19, Issue 3, Pages 148-153
Security For Three-Tiered Web Application
Ibn Al-Haitham Journal For Pure and Applied Sciences, 2015, Volume 28, Issue 2, Pages 193-199
Enhanced the Security of Electronic-Commerce (E-Commerce)
Journal of University of Babylon, 2016, Volume 24, Issue 5, Pages 1173-1180
Hiding and Encryption of Secret Image Using Secret Sharing Scheme
Iraqi Journal of Science, 2016, Volume 57, Issue 4A, Pages 2502-2512
FPGA Design and Implementation of Data Covering Based on MD5 Algorithm
Engineering and Technology Journal, 2016, Volume 34, Issue 14 Part (A) Engineering, Pages 2621-2630
VHDL Processor for Covering Information Using MD5 Algorithm I
The islamic college university journal, 2014, Volume , Issue 29, Pages 9-25
Advanced Architecture For Using MD5 Algorithm of Text File Digital Signature
The islamic college university journal, 2016, Volume , Issue 38, Pages 35-59
Design and Implementation of A Software Protection System Against Software Piracy By Using Cryptographic Techniques
Engineering and Technology Journal, 2010, Volume 28, Issue 1, Pages 126-148
Create A New Digital Signature Scheme Using Double Hush Function Algorithms
journal of kerbala university, 2013, Volume 1, Issue المؤتمر العلمي الاول لكلية العلوم, Pages 188-201