Broad view of cryptographic hash functions

Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cry...

Full description

Saved in:
Bibliographic Details
Main Authors: Alahmad, Mohammad, Alshaikhli, Imad Fakhri Taha
Format: Article
Language:English
Published: IJCSI Press 2013
Subjects:
Online Access:http://irep.iium.edu.my/34636/1/IJCSI-10-4-1-239-246.pdf
http://irep.iium.edu.my/34636/
http://ijcsi.org/papers/IJCSI-10-4-1-239-246.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
id my.iium.irep.34636
record_format dspace
spelling my.iium.irep.346362014-01-20T01:46:35Z http://irep.iium.edu.my/34636/ Broad view of cryptographic hash functions Alahmad, Mohammad Alshaikhli, Imad Fakhri Taha QA75 Electronic computers. Computer science Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cryptographic hash functions. It includes the properties, classification, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash functions. IJCSI Press 2013-07 Article REM application/pdf en http://irep.iium.edu.my/34636/1/IJCSI-10-4-1-239-246.pdf Alahmad, Mohammad and Alshaikhli, Imad Fakhri Taha (2013) Broad view of cryptographic hash functions. International Journal of Computer Science Issues (IJCSI), 10 (4). pp. 239-246. ISSN 1694-0814 http://ijcsi.org/papers/IJCSI-10-4-1-239-246.pdf
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Alahmad, Mohammad
Alshaikhli, Imad Fakhri Taha
Broad view of cryptographic hash functions
description Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cryptographic hash functions. It includes the properties, classification, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash functions.
format Article
author Alahmad, Mohammad
Alshaikhli, Imad Fakhri Taha
author_facet Alahmad, Mohammad
Alshaikhli, Imad Fakhri Taha
author_sort Alahmad, Mohammad
title Broad view of cryptographic hash functions
title_short Broad view of cryptographic hash functions
title_full Broad view of cryptographic hash functions
title_fullStr Broad view of cryptographic hash functions
title_full_unstemmed Broad view of cryptographic hash functions
title_sort broad view of cryptographic hash functions
publisher IJCSI Press
publishDate 2013
url http://irep.iium.edu.my/34636/1/IJCSI-10-4-1-239-246.pdf
http://irep.iium.edu.my/34636/
http://ijcsi.org/papers/IJCSI-10-4-1-239-246.pdf
_version_ 1643610654243815424