Broad view of cryptographic hash functions

Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cry...

Full description

Bibliographic Details
Main Authors: Alahmad, Mohammad, Alshaikhli, Imad Fakhri Taha
Format: Article
Language:English
Published: IJCSI Press 2013
Subjects:
Online Access:http://irep.iium.edu.my/34636/
http://irep.iium.edu.my/34636/
http://irep.iium.edu.my/34636/1/IJCSI-10-4-1-239-246.pdf
id iium-34636
recordtype eprints
spelling iium-346362014-01-20T01:46:35Z http://irep.iium.edu.my/34636/ Broad view of cryptographic hash functions Alahmad, Mohammad Alshaikhli, Imad Fakhri Taha QA75 Electronic computers. Computer science Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cryptographic hash functions. It includes the properties, classification, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash functions. IJCSI Press 2013-07 Article PeerReviewed application/pdf en http://irep.iium.edu.my/34636/1/IJCSI-10-4-1-239-246.pdf Alahmad, Mohammad and Alshaikhli, Imad Fakhri Taha (2013) Broad view of cryptographic hash functions. International Journal of Computer Science Issues (IJCSI), 10 (4). pp. 239-246. ISSN 1694-0814 http://ijcsi.org/papers/IJCSI-10-4-1-239-246.pdf
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Alahmad, Mohammad
Alshaikhli, Imad Fakhri Taha
Broad view of cryptographic hash functions
description Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cryptographic hash functions. It includes the properties, classification, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash functions.
format Article
author Alahmad, Mohammad
Alshaikhli, Imad Fakhri Taha
author_facet Alahmad, Mohammad
Alshaikhli, Imad Fakhri Taha
author_sort Alahmad, Mohammad
title Broad view of cryptographic hash functions
title_short Broad view of cryptographic hash functions
title_full Broad view of cryptographic hash functions
title_fullStr Broad view of cryptographic hash functions
title_full_unstemmed Broad view of cryptographic hash functions
title_sort broad view of cryptographic hash functions
publisher IJCSI Press
publishDate 2013
url http://irep.iium.edu.my/34636/
http://irep.iium.edu.my/34636/
http://irep.iium.edu.my/34636/1/IJCSI-10-4-1-239-246.pdf
first_indexed 2023-09-18T20:49:51Z
last_indexed 2023-09-18T20:49:51Z
_version_ 1777409921604648960