Search Results
- Articles
- Books & Media
- Our Website
- Collection Guides
- Archival Materials
ArticlesSee all articles results »
From journals and magazines
-
Implementasi Enkripsi Data Secure Hash Algorithm (SHA-256) dan Message Digest (...)
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1Z1LS8NAEIBX8aQH8QW-mYMHewjtdk2zQinUPqhKoRpBPIXNJttUbSxtpfjvndktErx40Iu3JZtkQnbCPHbyDWNnFRljiMZ9z4iK9i78oOrFvrn0MBDD5TbCF5ryHY_y5ql6dy-7rUKrL6oJc3hg9-LKQmql0Wwq4pBrjg6hIaScSWWg0ZxZ1wij8kIwhZpEFDsirXxlW6pEPbFIZn5BOUHLJi1A-q016W6xzaUbCE0nfputjpIdtlGAA-6uhBbca2u7ZyPo5C_4eeOgreYK6lnDJspT6KlZBs3X4RsG-dm4Xs4acB72mh76GCVIVA596nEyTMHtJNGV387ut_0STFSiYIAWM53BIM2Hiqpac7glYSH9-QIh6cOYJp9VsqCCSJydfqgFDv7Nk-6x627nodXzaE2iiSNtRMS-tgdQI6KlRkQ_aYTYZ8A1N4EQxtRqMSUAYkK3JSYJDOdaSXnArn4v6PAvbnLE1tEHk65C5pitzafv6YnrTHFqdfoTY2__zg
Jurnal Teknik Elektro, Volume 10, Issue 2, pp. 70 - 74
Journal Article : Full Text Online
-
SU-F-T-95: An Automatic Data Verification Method During An Eclipse/Aria Version Upgrade Using (...)
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1JSwMxFA5FcLm4VMGdoOJt7KSZdDJaCkMXRCiuVTwNSWZiBW1LOz148xeIv9FfYrYWPSjiIczlZWDmveTt3wPgwKdcuWiIeBL7wgtIWPY4kZGnHDHFbokJFjrecUfP7suXV7RVL4CTSS-MxYeYBtz0yTD3tT7gjLspJEgXrqMjbduXTQ-1Rm3SxtF5fXoLK0Vq20-iQGcQiEMVUntL053fdNG8Ujk2-_3FTi07RdNasgUhZhqZrrI-slUmNt7wrfx6guP4z69ZBovOFIWxlZ0VUMh6RTDXdsn2Ipg11aFitArerjsfr-8ttW7UisgxjHswHud9g_cKGyxn8FaJsnQBQNg2c6lhw_RAauKm0CmHrBQreYcuRgc7g4chSzNoyhZgffgyyC2AtnpntVszqYAMnrJRF8ZPD_3hY959rpa6tTXQaTVv6qeeG-TgCeVdIk8GRERcYEYrBMtKJaJMuVkaqp-ZEaGpoD73Qy6YIvEJk4ILEQhEUx6EaYDxOoBIIBliLNV2rl16rsHYUpmGEiHBKN0AexNeJgML1JFYB4cmKHE_dwPsT7n8G9WhYdXPFEn7Qj82_0q4BRaUoVWxJWbbYCYfjrMdO35i14jtJ-Dt7oM
Medical Physics (Lancaster), Volume 43, Issue 6, p. 3483
Journal Article : Full Text Online
-
A novel chaos-based image encryption using DNA sequence operation and Secure Hash (...)
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dT9swELc2eGEPY4NJlEHlSXvaZJbEcT6kCinrWnU8dBtlGvAS2U5MkEqDmhaJ_353idOCtCHxkjz4kjj2-Xy_u_MdIR-dSAFEcwUz3NHMF6HHlDAxAyAG02244BrtHX-ikwvv12k07Ntz3FUb7d66JGtJvT7sBkgFoa9gHmzqLHxJNgX6hYCJJ-PBSvxyry5D5wCwQCPEeevK_NcrHm9Gaw3zoVOU271muN0UVK17iYHWR02gSWNyeBSB3aZyfOYPvSGvrRZKk4Zt3pIX-WyHbFuNlNr1Xu2QVw_SFe6SIqGz8i6fUl3IsmK4AWb0-gYkEgX6-X0tfShG0l_Rb-OEtmHatLzNG0ajcpbRXnFcW_lzOpJVQZPpVTm_XhQ3vS_FMZ2MEua9I7-Hg7P-iNlKDUwLN1owZYLQOHkW-0ZpV2qey9AXMvDQIiyEUqHyQJfQkYmMBCUr9hXgHExWlymA4A7fI9TVrgk5NyYIFGJ2hdnWMpOFxnW1jKIOcdq5SrXNX45lNKbpOvMyDmgKA5rigKZhh3xaPXLbJO94ivigZYDUruMqBWkX-6DhBtD8YdUMKxDdKnKWl8sqRZHmxwBM4ydoMH1nEIPu1CGfW25Yf-a_ndp_FvV7sgX6nA0qPyAbi_kyP2yqXHTJ5tfB-Ocp3Ef978PLLga5Trr10sHrj5O_scYP8w
Nonlinear Dynamics, Volume 83, Issue 3, pp. 1123 - 1136
Journal Article : Full Text Online
Books & MediaSee all books & media results »
Books, music, movies and more
-
Secure hash standard (SHS).
https://find.library.duke.edu/catalog/UNCb6340209
Book, Government publication : View Online
-
Third-round report of the SHA-3 cryptographic hash algorithm competition
https://find.library.duke.edu/catalog/UNCb9524000
Book, Government publication : View Online
-
Recommendation for applications using approved hash algorithms
https://find.library.duke.edu/catalog/UNCb6056234
Book, Government publication : View Online
Collection Guides
Detailed inventories of archival collections
Some materials and descriptions may include offensive content. More info