Cryptographic hash function: a high level view

Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This chapter provides a detailed overview to include classification, properties, cons...

Full description

Bibliographic Details
Main Authors: Taha, Imad, Alahmad, Mohammad A.
Other Authors: alhamami, Alaa
Format: Book Chapter
Language:English
Published: IGI Global 2015
Subjects:
Online Access:http://irep.iium.edu.my/46830/
http://irep.iium.edu.my/46830/
http://irep.iium.edu.my/46830/5/Book-Chapter-Completed.pdf