DOI:10.20894/IJCOA.
Periodicity: Bi Annual.
Impact Factor:
SJIF:5.079 & GIF:0.416
Submission:Any Time
Publisher: IIR Groups
Language: English
Review Process:
Double Blinded

Paper Template
Copyright Form
Subscription Form
web counter
web counter

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJCOA provides online manuscript tracking system.

Every issue of Journal of IJCOA is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJCOA special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJCOA website. For complete procedure, contact us at admin@iirgroups.org

SCIA Journal Metrics


SCIA-GRAPH
SCIA-SAI
Published in:   Vol. 7 Issue 1 Date of Publication:   June 2018

Cryptographic Hash Algorithms Performance Finding using .Net Simulation

B.Nithya,P.Sripriya

Page(s):   35-39 ISSN:   2278-2397
DOI:   10.20894/IJCOA.101.007.001.008 Publisher:   Integrated Intelligent Research (IIR)


  1. Piyush Gupta, Sandeep Kumar,,   "A Comparative Analysis of SHA and MD5Algorithm",    International Journal of Computer Science and Inf   ,Vol.5   ,Issue 3   ,2014
    View Artical

  2. B. Madhuravani, D. S. R Murthy,   "Cryptographic Hash Functions: SHA Family",   International Journal of Innovative Technology and   ,Vol.2   ,Issue 4   ,2013
    View Artical

  3. Smriti Gupta, Sandeep Kumar Yadav,   "Performance Analysis of Cryptographic Hash Functions",    International Journal of Science and Research   ,Vol.4   ,Issue 8   ,2015
    View Artical

  4. Hanumantu Rajeswari , Ramesh Yegireddi , Vudumula Govinda Rao,   "?Performance Analysis of Hash Algorithms and File Integrity ",   International Journal of Computer Science and Info   ,Vol.5   ,Issue 6   ,2014
    View Artical

  5. Kamlesh kumar, Raghuvanshi Purnima, Khurana Purnima Bindal,,   "Study and Comparative Analysis of Different Hash Algorithm",   Journal of Engineering Computers & Applied Science   ,Vol.3   ,Issue 9   ,2014
    View Artical

  6. Pritesh N. Patel, Jigisha K. Patel and Paresh V. Virparia,   "A Cryptography Application using Salt Hash Technique",   International Journal of Application or Innovation   ,Vol.2   ,Issue 6   ,2013
    View Artical

  7. Sangeeta Raheja Shradha Verma,   "Comparative study of Hashing Algorithm Using Cryptographic and Steganography Using Audio Files",    International Journal of Advanced Research in Com   ,Vol.4   ,Issue 5   ,2014
    View Artical

  8. Deepika Sharma, Pushpender Sarao,,   " Implementation of Md5- 640 Bits Algorithm",   International Journal of Advance Research in Compu   ,Vol.3   ,Issue 5   ,2015
    View Artical

  9. Sheena Mathew, K. Poulose Jacob,   "Performance Evaluation of Popular Hash Functions",   World Academy of Science, Engineering and Technolo   ,Vol.4   ,Issue 1   ,2010
    View Artical

  10. Nithya B, Sripriya.P. ,   "A Review of Cryptographic Algorithms in Network Security",    International Journal of Engineering and Technolo   ,Vol.8   ,Issue 1   ,2016
    View Artical

  11. William Stallings,   "A Book: Cryptography and Network Security Principles and Practice   ,Vol.99   ,Issue 1   ,2006
    View Artical

  12. Marc Stevens,   "A Book: Attacks on Hash Functions and Applications   ,2000
    View Artical

  13. Mohammad A. Alahmad, Imad Fakhi Alshaihli,   "Broad View of Cryptographic Hash Functions",    International Journal of Computer Science Issues   ,Vol.4   ,Issue 1   ,2013
    View Artical