Broad view of cryptographic hash functions
Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cry...
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IJCSI Press
2013
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/34636/ http://irep.iium.edu.my/34636/ http://irep.iium.edu.my/34636/1/IJCSI-10-4-1-239-246.pdf |
| id |
iium-34636 |
|---|---|
| recordtype |
eprints |
| spelling |
iium-346362014-01-20T01:46:35Z http://irep.iium.edu.my/34636/ Broad view of cryptographic hash functions Alahmad, Mohammad Alshaikhli, Imad Fakhri Taha QA75 Electronic computers. Computer science Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cryptographic hash functions. It includes the properties, classification, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash functions. IJCSI Press 2013-07 Article PeerReviewed application/pdf en http://irep.iium.edu.my/34636/1/IJCSI-10-4-1-239-246.pdf Alahmad, Mohammad and Alshaikhli, Imad Fakhri Taha (2013) Broad view of cryptographic hash functions. International Journal of Computer Science Issues (IJCSI), 10 (4). pp. 239-246. ISSN 1694-0814 http://ijcsi.org/papers/IJCSI-10-4-1-239-246.pdf |
| repository_type |
Digital Repository |
| institution_category |
Local University |
| institution |
International Islamic University Malaysia |
| building |
IIUM Repository |
| collection |
Online Access |
| language |
English |
| topic |
QA75 Electronic computers. Computer science |
| spellingShingle |
QA75 Electronic computers. Computer science Alahmad, Mohammad Alshaikhli, Imad Fakhri Taha Broad view of cryptographic hash functions |
| description |
Cryptographic hash function is a function that takes an arbitrary length
as an input and produces a fixed size of an output. The viability of using
cryptographic hash function is to verify data integrity and sender identity
or source of information. This paper provides a detailed overview of
cryptographic hash functions. It includes the properties, classification,
constructions, attacks, applications and an overview of a selected
dedicated cryptographic hash functions. |
| format |
Article |
| author |
Alahmad, Mohammad Alshaikhli, Imad Fakhri Taha |
| author_facet |
Alahmad, Mohammad Alshaikhli, Imad Fakhri Taha |
| author_sort |
Alahmad, Mohammad |
| title |
Broad view of cryptographic hash functions |
| title_short |
Broad view of cryptographic hash functions |
| title_full |
Broad view of cryptographic hash functions |
| title_fullStr |
Broad view of cryptographic hash functions |
| title_full_unstemmed |
Broad view of cryptographic hash functions |
| title_sort |
broad view of cryptographic hash functions |
| publisher |
IJCSI Press |
| publishDate |
2013 |
| url |
http://irep.iium.edu.my/34636/ http://irep.iium.edu.my/34636/ http://irep.iium.edu.my/34636/1/IJCSI-10-4-1-239-246.pdf |
| first_indexed |
2023-09-18T20:49:51Z |
| last_indexed |
2023-09-18T20:49:51Z |
| _version_ |
1777409921604648960 |