This work is licensed under the Creative Commons Attribution 4.0 International License.
El-kenawy, E. S., Saber, M., & Arnous, R. (2019). An integrated framework to ensure information security over the internet. International Journal of Computer Applications, 975, 8887.Search in Google Scholar
Joshi, C., & Singh, U. K. (2017). Information security risks management framework–A step towards mitigating security risks in university network. Journal of Information Security and Applications, 35, 128-137.Search in Google Scholar
Miloslavskaya, N., & Tolstoy, A. (2019). Internet of Things: information security challenges and solutions. Cluster Computing, 22, 103-119.Search in Google Scholar
Pachghare, V. K. (2019). Cryptography and information security. PHI Learning Pvt. Ltd..Search in Google Scholar
Arbanas, K., & Žajdela Hrustek, N. (2019). Key success factors of information systems security. Journal of information and organizational sciences, 43(2), 131-144.Search in Google Scholar
Lundgren, B., & Möller, N. (2019). Defining information security. Science and engineering ethics, 25, 419-441.Search in Google Scholar
Lin, W., Yang, C., Zhang, Z., Xue, X., & Haga, R. (2021). A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data. KSII Transactions on Internet and Information Systems (TIIS), 15(12), 4531-4544.Search in Google Scholar
Dastres, R., & Soori, M. (2021). A review in recent development of network threats and security measures. International Journal of Information Sciences and Computer Engineering.Search in Google Scholar
Yang, Y., Chen, F., Zhang, X., Yu, J., & Zhang, P. (2017). Research on the hash function structures and its application. Wireless Personal Communications, 94, 2969-2985.Search in Google Scholar
Maetouq, A., Daud, S. M., Ahmad, N. A., Maarop, N., Sjarif, N. N. A., & Abas, H. (2018). Comparison of hash function algorithms against attacks: A review. International Journal of Advanced Computer Science and Applications, 9(8).Search in Google Scholar
Wang, Y., Chen, L., Yu, K., & Lu, T. (2022). Image encryption algorithm based on lattice hash function and privacy protection. Multimedia Tools and Applications, 81(13), 18251-18277.Search in Google Scholar
Grassi, L., Khovratovich, D., & Schofnegger, M. (2023, July). Poseidon2: A faster version of the poseidon hash function. In International Conference on Cryptology in Africa (pp. 177-203). Cham: Springer Nature Switzerland.Search in Google Scholar
Mouha, N., Raunak, M. S., Kuhn, D. R., & Kacker, R. (2018). Finding bugs in cryptographic hash function implementations. IEEE transactions on reliability, 67(3), 870-884.Search in Google Scholar
Sabek, I., Vaidya, K., Horn, D., Kipf, A., Mitzenmacher, M., & Kraska, T. (2022). Can Learned Models Replace Hash Functions?. Proceedings of the VLDB Endowment, 16(3).Search in Google Scholar
Grassi, L., Khovratovich, D., Lüftenegger, R., Rechberger, C., Schofnegger, M., & Walch, R. (2022, November). Reinforced concrete: a fast hash function for verifiable computation. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (pp. 1323-1335).Search in Google Scholar
Zaripova, D. A. (2021). Network security issues and effective protection against network attacks. International Journal on Integrated Education, 4(2), 79-85.Search in Google Scholar
Neupane, K., Haddad, R., & Chen, L. (2018, April). Next generation firewall for network security: a survey. In SoutheastCon 2018 (pp. 1-6). IEEE.Search in Google Scholar
Sharma, A. K., & Mittal, S. K. (2019, January). Cryptography & network security hash function applications, attacks and advances: A review. In 2019 Third International Conference on Inventive Systems and Control (ICISC) (pp. 177-188). IEEE.Search in Google Scholar
Hasan, H. A., Al-Layla, H. F., & Ibraheem, F. N. (2022). A review of hash function types and their applications. Wasit Journal of Computer and Mathematics Science, 1(3), 75-88.Search in Google Scholar
Jain, A., & Mangal, N. (2020). Application of stream cipher and hash function in network security. In Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI-2018) (pp. 429-435). Springer International Publishing.Search in Google Scholar
Hrytsak, A., Kinzeryavyy, V., Prysiazhnyi, D., Burmak, Y., & Samoylik, Y. (2020). High-Speed and Secure Hash Function for Blockchain Security Mechanisms. Scientific and practical cyber security journal (SPCSJ), 4(1), 65-70.Search in Google Scholar
Xu Dai,Xiaotong Wang,Haotong Han & Erfu Wang. (2024). N-Dimensional Non-Degenerate Chaos Based on Two-Parameter Gain with Application to Hash Function. Electronics(13),2627-2627.Search in Google Scholar
Soo Kyung Eom,Hyang‐Sook Lee & Seongan Lim. (2016). Message Expansion of Homomorphic Encryption Using Product Pairing. ETRI Journal(1),123-132.Search in Google Scholar
Wroński Michał,Kijko Tomasz & Dryło Robert. (2022). High-degree Compression Functions on Alternative Models of Elliptic Curves and their Applications. Fundamenta Informaticae(2),107-139.Search in Google Scholar
S Phani Praveen,V Sathiya Suntharam,S Ravi,U. Harita,Venkata Nagaraju Thatha & D Swapna. (2023). A Novel Dual Confusion and Diffusion Approach for Grey Image Encryption using Multiple Chaotic Maps. International Journal of Advanced Computer Science and Applications (IJACSA)(8).Search in Google Scholar
Xiaotong Cui,Hongxin Zhang,Xing Fang,Yuanzhen Wang,Danzhi Wang,Fan Fan & Lei Shu. (2023). A Secret Key Classification Framework of Symmetric Encryption Algorithm Based on Deep Transfer Learning. Applied Sciences(21).Search in Google Scholar
Qingjia Luo & Zongfu Zhang. (2023). The Secure Data Transmission Method of a Cellular Communication Network Based on the Asymmetric Encryption Algorithm. Journal of Communications(2).Search in Google Scholar