Alkandari, Abdulaziz Ali and Alshaikhli, Imad Fakhri Taha and Alahmad, Mohammad A. (2013) Cryptographic hash function: A high level view. In: International Conference on Informatics and Creative Multimedia (ICICM), 2013, 4-6 September 2013, Kuala Lumpur, Malaysia.
PDF (Cryptographic hash function: A high level view)
- Published Version
Restricted to Registered users only Download (630kB) | Request a copy |
Official URL: http://dx.doi.org/10.1109/ICICM.2013.29
Abstract
Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This paper provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash function.
Item Type: | Conference or Workshop Item (Full Paper) |
---|---|
Additional Information: | 6534/36069 |
Uncontrolled Keywords: | cryptographic hash function, construction, attack, classification, SHA-1, SHA-2, SHA-3. |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): | Kulliyyah of Information and Communication Technology > Department of Computer Science Kulliyyah of Information and Communication Technology > Department of Computer Science |
Depositing User: | Professor Imad Taha |
Date Deposited: | 17 Mar 2014 14:55 |
Last Modified: | 17 Mar 2014 14:55 |
URI: | http://irep.iium.edu.my/id/eprint/36069 |
Actions (login required)
View Item |