Broad view of cryptographic hash functions
Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cry...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
IJCSI Press
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/34636/1/IJCSI-10-4-1-239-246.pdf http://irep.iium.edu.my/34636/ http://ijcsi.org/papers/IJCSI-10-4-1-239-246.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Islam Antarabangsa Malaysia |
Language: | English |
id |
my.iium.irep.34636 |
---|---|
record_format |
dspace |
spelling |
my.iium.irep.346362014-01-20T01:46:35Z http://irep.iium.edu.my/34636/ Broad view of cryptographic hash functions Alahmad, Mohammad Alshaikhli, Imad Fakhri Taha QA75 Electronic computers. Computer science Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cryptographic hash functions. It includes the properties, classification, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash functions. IJCSI Press 2013-07 Article REM application/pdf en http://irep.iium.edu.my/34636/1/IJCSI-10-4-1-239-246.pdf Alahmad, Mohammad and Alshaikhli, Imad Fakhri Taha (2013) Broad view of cryptographic hash functions. International Journal of Computer Science Issues (IJCSI), 10 (4). pp. 239-246. ISSN 1694-0814 http://ijcsi.org/papers/IJCSI-10-4-1-239-246.pdf |
institution |
Universiti Islam Antarabangsa Malaysia |
building |
IIUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
International Islamic University Malaysia |
content_source |
IIUM Repository (IREP) |
url_provider |
http://irep.iium.edu.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Alahmad, Mohammad Alshaikhli, Imad Fakhri Taha Broad view of cryptographic hash functions |
description |
Cryptographic hash function is a function that takes an arbitrary length
as an input and produces a fixed size of an output. The viability of using
cryptographic hash function is to verify data integrity and sender identity
or source of information. This paper provides a detailed overview of
cryptographic hash functions. It includes the properties, classification,
constructions, attacks, applications and an overview of a selected
dedicated cryptographic hash functions. |
format |
Article |
author |
Alahmad, Mohammad Alshaikhli, Imad Fakhri Taha |
author_facet |
Alahmad, Mohammad Alshaikhli, Imad Fakhri Taha |
author_sort |
Alahmad, Mohammad |
title |
Broad view of cryptographic hash functions |
title_short |
Broad view of cryptographic hash functions |
title_full |
Broad view of cryptographic hash functions |
title_fullStr |
Broad view of cryptographic hash functions |
title_full_unstemmed |
Broad view of cryptographic hash functions |
title_sort |
broad view of cryptographic hash functions |
publisher |
IJCSI Press |
publishDate |
2013 |
url |
http://irep.iium.edu.my/34636/1/IJCSI-10-4-1-239-246.pdf http://irep.iium.edu.my/34636/ http://ijcsi.org/papers/IJCSI-10-4-1-239-246.pdf |
_version_ |
1643610654243815424 |