Reference Citations - HerongYang.com - v2.95, by Herong Yang
IMPLEMENTATION OF SECURE HASH ALGORITHM SHA-1 BY LABVIEW
'SHA1 Message Digest Algorithm Overview' tutorial was cited an International Journal of Computer Science and Mobile Computing paper in 2015.
The SHA1 Message Digest Algorithm Overview tutorial was cited in an International Journal of Computer Science and Mobile Computing paper in 2015.
Subject: IMPLEMENTATION OF SECURE HASH ALGORITHM SHA-1 BY LABVIEW Date: Mar 1, 2015 Author: Raaed K. Ibrahim, Ali SH. Hussain, Roula A. Kadhim Source: http://www.ijcsmc.com/docs/papers/March2015/V4I3201553.pdf Abstract - This paper presents the implementation of secure hash algorithm using VI LabVIEW environment toolkit. The SHA-1 used in many fields of security systems such as digital signature, tamper detection, password protection and so on. SHA-1 is a very important algorithm for integrity and authentication realization. The proposed algorithm of SHA-1 in this paper implemented by LabVIEW software from entering string, padding, SHA-1 core, and message digest to produce 160 bits hash code for any plaintext. From the implementation and simulation results of SHA-1 hash function obtained in LabVIEW project show that simplicity in modelling hashing algorithm, generating hash codes in English plaintext, Arabic plaintext, symbols, and numbers. ... A sequence of constant words K(0), K(1), ... , K(79) is used in the SHA-1. In hex these are given by: K(t) = 5A827999 ( 0 <= t <= 19) K(t) = 6ED9EBA1 (20 <= t <= 39) K(t) = 8F1BBCDC (40 <= t <= 59) K(t) = CA62C1D6 (60 <= t <= 79). (Eastlake & Jones, 2001) (Lawrence C. Washington) (Yang, 2014). ... [8] t. f. Wikipedia, “SHA-1,” Wikipedia, 19 November 2014. [Online]. Available: http://en.wikipedia.org/wiki/SHA-1. [Accessed 3 jan. 2015]. [9] D. H. Yang, “Cryptography Tutorials - Herong's Tutorial Examples,” Retrieved from SHA1 Mesasge Digest Algorithm, 10 sep. 2014. [Online]. Available: https://www.herongyang.com/Cryptography /SHA1-MessageDigest-Algorithm-Overview.html. [Accessed 10 jan. 2015].
Table of Contents
SSL/TLS Overview - Change Cipher Spec Protocol
PFX to Java Keystore / Extract private key from Java Keystore
Android talks #08 decompiling android applications
Cpronto 2.5 Administration Guide
►IMPLEMENTATION OF SECURE HASH ALGORITHM SHA-1 BY LABVIEW
Cryptographic Protocols - The Peruvian Coin Flip
Bug 378637 - Add support for connecting to HTTP proxy over HTTPS
an information literacy technology for chemistry documents
org.jruby.exceptions.RaiseException: stack level too deep
Another function that helps programmers calculate
CONNECTING TO A SOAP WEB SERVICE
Application of the Enhanced SHA-1
Apex Soap call authentication problem
Recording Video of an Android Device
Java HTTPS server code failing
How to Capture Logcat Files Using ADB