IIUM Repository

Cryptographic hash function: a high level view

Taha, Imad and Alahmad, Mohammad A. (2015) Cryptographic hash function: a high level view. In: Threat Detection and Countermeasures in Network Security. IGI Global, USA, pp. 80-94. ISBN 978-1-4666-6583-5

[img] PDF (Cryptographic hash function: A high level view) - Published Version
Restricted to Repository staff only

Download (2MB) | Request a copy

Abstract

Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This chapter provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash function.

Item Type: Book Chapter
Additional Information: 6534/46830
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology > Department of Computer Science
Kulliyyah of Information and Communication Technology > Department of Computer Science
Depositing User: Professor Imad Taha
Date Deposited: 08 Jan 2016 17:55
Last Modified: 26 Jul 2016 15:55
URI: http://irep.iium.edu.my/id/eprint/46830

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year