IIUM Repository

Cryptographic hash function: A high level view

Alkandari, Abdulaziz Ali and Alshaikhli, Imad Fakhri Taha and Alahmad, Mohammad A. (2013) Cryptographic hash function: A high level view. In: International Conference on Informatics and Creative Multimedia (ICICM), 2013, 4-6 September 2013, Kuala Lumpur, Malaysia.

[img] PDF (Cryptographic hash function: A high level view) - Published Version
Restricted to Registered users only

Download (630kB) | Request a copy

Abstract

Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This paper provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash function.

Item Type: Conference or Workshop Item (Full Paper)
Additional Information: 6534/36069
Uncontrolled Keywords: cryptographic hash function, construction, attack, classification, SHA-1, SHA-2, SHA-3.
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology > Department of Computer Science
Kulliyyah of Information and Communication Technology > Department of Computer Science
Depositing User: Professor Imad Taha
Date Deposited: 17 Mar 2014 14:55
Last Modified: 17 Mar 2014 14:55
URI: http://irep.iium.edu.my/id/eprint/36069

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year