Cryptographic hash function: a high level view
Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This chapter provides a detailed overview to include classification, properties, cons...
| Main Authors: | , |
|---|---|
| Other Authors: | |
| Format: | Book Chapter |
| Language: | English |
| Published: |
IGI Global
2015
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/46830/ http://irep.iium.edu.my/46830/ http://irep.iium.edu.my/46830/5/Book-Chapter-Completed.pdf |