DOI:10.20894/IJCOA. Periodicity: Bi Annual. Impact Factor: SJIF:5.079 & GIF:0.416 Submission:Any Time Publisher: IIR Groups Language: English Review Process: Double Blinded
Piyush Gupta, Sandeep Kumar,, "A Comparative Analysis of SHA and MD5Algorithm", International Journal of Computer Science and Inf ,Vol.5 ,Issue 3 ,2014 View Artical
B. Madhuravani, D. S. R Murthy, "Cryptographic Hash Functions: SHA Family", International Journal of Innovative Technology and ,Vol.2 ,Issue 4 ,2013 View Artical
Smriti Gupta, Sandeep Kumar Yadav, "Performance Analysis of Cryptographic Hash Functions", International Journal of Science and Research ,Vol.4 ,Issue 8 ,2015 View Artical
Hanumantu Rajeswari , Ramesh Yegireddi , Vudumula Govinda Rao, "?Performance Analysis of Hash Algorithms and File Integrity ", International Journal of Computer Science and Info ,Vol.5 ,Issue 6 ,2014 View Artical
Kamlesh kumar, Raghuvanshi Purnima, Khurana Purnima Bindal,, "Study and Comparative Analysis of Different Hash Algorithm", Journal of Engineering Computers & Applied Science ,Vol.3 ,Issue 9 ,2014 View Artical
Pritesh N. Patel, Jigisha K. Patel and Paresh V. Virparia, "A Cryptography Application using Salt Hash Technique", International Journal of Application or Innovation ,Vol.2 ,Issue 6 ,2013 View Artical
Sangeeta Raheja Shradha Verma, "Comparative study of Hashing Algorithm Using Cryptographic and Steganography Using Audio Files", International Journal of Advanced Research in Com ,Vol.4 ,Issue 5 ,2014 View Artical
Deepika Sharma, Pushpender Sarao,, " Implementation of Md5- 640 Bits Algorithm", International Journal of Advance Research in Compu ,Vol.3 ,Issue 5 ,2015 View Artical
Sheena Mathew, K. Poulose Jacob, "Performance Evaluation of Popular Hash Functions", World Academy of Science, Engineering and Technolo ,Vol.4 ,Issue 1 ,2010 View Artical
Nithya B, Sripriya.P. , "A Review of Cryptographic Algorithms in Network Security", International Journal of Engineering and Technolo ,Vol.8 ,Issue 1 ,2016 View Artical
William Stallings, "A Book: Cryptography and Network Security Principles and Practice ,Vol.99 ,Issue 1 ,2006 View Artical
Marc Stevens, "A Book: Attacks on Hash Functions and Applications ,2000 View Artical
Mohammad A. Alahmad, Imad Fakhi Alshaihli, "Broad View of Cryptographic Hash Functions", International Journal of Computer Science Issues ,Vol.4 ,Issue 1 ,2013 View Artical