Skip to search formSkip to main contentSkip to account menu

Secure Hash Algorithm-1

Known as: SHA1, secure hash algorithm - 1 
An algorithm for computing a condensed representation of a message or a data file that produces a 160-bit message digest.
National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Cryptography is a science that provides the security of information in communication. One of the most important sub-branches of… 
2016
2016
Code multipath is an unmanaged error source in precise global navigation satellite system (GNSS) observation processing that… 
2015
2015
The design of communication protocols in the Mobile Ad hoc Networks (MANET) is challenging due to limited wireless transmission… 
2014
2014
Wireless sensor networks (WSNs) are used in many applications to gather sensitive information which is then forwarded to an… 
2013
2013
Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while… 
2012
2012
:- To provide security of the images in the multimedia environment encryption plays an important role. The traditional… 
2012
2012
Nowadays, security of SMS is a crucial aspect because it plays an important role in value added services and mobile commerce… 
2007
2007
We have devised one 160 bits improved hash algorithm based on MD5 and SHA1. And in additional, we also introduce four assistant… 
2007
2007
  • David Lee
  • 2007
  • Corpus ID: 7298934
A hash chain is constructed by repeated hashing from an initial value. While it finds applications for network protocol design it… 
1998
1998
An enormous number of commercial applications (over 350 million copies) rely on the BSAFE and JSAFE toolkits from RSA Data…