Cryptographic hash function: a high level view
Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This chapter provides a detailed overview to include classification, properties, cons...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Book Chapter |
Language: | English |
Published: |
IGI Global
2015
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/46830/ http://irep.iium.edu.my/46830/ http://irep.iium.edu.my/46830/5/Book-Chapter-Completed.pdf |
id |
iium-46830 |
---|---|
recordtype |
eprints |
spelling |
iium-468302016-07-26T07:55:32Z http://irep.iium.edu.my/46830/ Cryptographic hash function: a high level view Taha, Imad Alahmad, Mohammad A. QA75 Electronic computers. Computer science Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This chapter provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash function. IGI Global alhamami, Alaa 2015 Book Chapter PeerReviewed application/pdf en http://irep.iium.edu.my/46830/5/Book-Chapter-Completed.pdf Taha, Imad and Alahmad, Mohammad A. (2015) Cryptographic hash function: a high level view. In: Threat Detection and Countermeasures in Network Security. IGI Global, USA, pp. 80-94. ISBN 978-1-4666-6583-5 http://www.igi-global.com |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Taha, Imad Alahmad, Mohammad A. Cryptographic hash function: a high level view |
description |
Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This chapter provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash function.
|
author2 |
alhamami, Alaa |
author_facet |
alhamami, Alaa Taha, Imad Alahmad, Mohammad A. |
format |
Book Chapter |
author |
Taha, Imad Alahmad, Mohammad A. |
author_sort |
Taha, Imad |
title |
Cryptographic hash function: a high level view |
title_short |
Cryptographic hash function: a high level view |
title_full |
Cryptographic hash function: a high level view |
title_fullStr |
Cryptographic hash function: a high level view |
title_full_unstemmed |
Cryptographic hash function: a high level view |
title_sort |
cryptographic hash function: a high level view |
publisher |
IGI Global |
publishDate |
2015 |
url |
http://irep.iium.edu.my/46830/ http://irep.iium.edu.my/46830/ http://irep.iium.edu.my/46830/5/Book-Chapter-Completed.pdf |
first_indexed |
2023-09-18T21:06:39Z |
last_indexed |
2023-09-18T21:06:39Z |
_version_ |
1777410977874051072 |