System Analysis and Example of Using SHA-512 Hash Functions to Protect Students' Personal Data on Educational Platforms
2021 IEEE 16th International Conference on Computer Sciences and Information Technologies (CSIT)(2021)
Abstract
In modern conditions the use of hash functions for the protection of personal data plays an applied and fundamental role in the creation of educational environments on computing systems using cryptographic methods. To effectively solve this topical problem, the protection functions simultaneously pass the data of limited length to the consumer, which leads to the reduction and fixation of the size...
MoreTranslated text
Key words
Hash functions,Learning systems,Conferences,Software algorithms,Throughput,Software,Hardware
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined