Broad view of cryptographic hash functions
Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cry...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
IJCSI Press
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/34636/ http://irep.iium.edu.my/34636/ http://irep.iium.edu.my/34636/1/IJCSI-10-4-1-239-246.pdf |
id |
iium-34636 |
---|---|
recordtype |
eprints |
spelling |
iium-346362014-01-20T01:46:35Z http://irep.iium.edu.my/34636/ Broad view of cryptographic hash functions Alahmad, Mohammad Alshaikhli, Imad Fakhri Taha QA75 Electronic computers. Computer science Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cryptographic hash functions. It includes the properties, classification, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash functions. IJCSI Press 2013-07 Article PeerReviewed application/pdf en http://irep.iium.edu.my/34636/1/IJCSI-10-4-1-239-246.pdf Alahmad, Mohammad and Alshaikhli, Imad Fakhri Taha (2013) Broad view of cryptographic hash functions. International Journal of Computer Science Issues (IJCSI), 10 (4). pp. 239-246. ISSN 1694-0814 http://ijcsi.org/papers/IJCSI-10-4-1-239-246.pdf |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Alahmad, Mohammad Alshaikhli, Imad Fakhri Taha Broad view of cryptographic hash functions |
description |
Cryptographic hash function is a function that takes an arbitrary length
as an input and produces a fixed size of an output. The viability of using
cryptographic hash function is to verify data integrity and sender identity
or source of information. This paper provides a detailed overview of
cryptographic hash functions. It includes the properties, classification,
constructions, attacks, applications and an overview of a selected
dedicated cryptographic hash functions. |
format |
Article |
author |
Alahmad, Mohammad Alshaikhli, Imad Fakhri Taha |
author_facet |
Alahmad, Mohammad Alshaikhli, Imad Fakhri Taha |
author_sort |
Alahmad, Mohammad |
title |
Broad view of cryptographic hash functions |
title_short |
Broad view of cryptographic hash functions |
title_full |
Broad view of cryptographic hash functions |
title_fullStr |
Broad view of cryptographic hash functions |
title_full_unstemmed |
Broad view of cryptographic hash functions |
title_sort |
broad view of cryptographic hash functions |
publisher |
IJCSI Press |
publishDate |
2013 |
url |
http://irep.iium.edu.my/34636/ http://irep.iium.edu.my/34636/ http://irep.iium.edu.my/34636/1/IJCSI-10-4-1-239-246.pdf |
first_indexed |
2023-09-18T20:49:51Z |
last_indexed |
2023-09-18T20:49:51Z |
_version_ |
1777409921604648960 |