Taha, Imad and Alahmad, Mohammad A. (2015) Cryptographic hash function: a high level view. In: Threat Detection and Countermeasures in Network Security. IGI Global, USA, pp. 80-94. ISBN 978-1-4666-6583-5
PDF (Cryptographic hash function: A high level view)
- Published Version
Restricted to Repository staff only Download (2MB) | Request a copy |
Official URL: http://www.igi-global.com
Abstract
Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This chapter provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash function.
Item Type: | Book Chapter |
---|---|
Additional Information: | 6534/46830 |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): | Kulliyyah of Information and Communication Technology > Department of Computer Science Kulliyyah of Information and Communication Technology > Department of Computer Science |
Depositing User: | Professor Imad Taha |
Date Deposited: | 08 Jan 2016 17:55 |
Last Modified: | 26 Jul 2016 15:55 |
URI: | http://irep.iium.edu.my/id/eprint/46830 |
Actions (login required)
View Item |