Cryptographic hash function: A high level view
Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This paper provides a detailed overview to include classification, properties, const...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/36069/1/icicm13-paper-1.pdf http://irep.iium.edu.my/36069/ http://dx.doi.org/10.1109/ICICM.2013.29 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.iium.irep.36069 |
---|---|
record_format |
dspace |
spelling |
my.iium.irep.360692014-03-17T06:55:58Z http://irep.iium.edu.my/36069/ Cryptographic hash function: A high level view Alkandari, Abdulaziz Ali Alshaikhli, Imad Fakhri Taha Alahmad, Mohammad A. QA75 Electronic computers. Computer science Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This paper provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash function. 2013-09-04 Conference or Workshop Item REM application/pdf en http://irep.iium.edu.my/36069/1/icicm13-paper-1.pdf Alkandari, Abdulaziz Ali and Alshaikhli, Imad Fakhri Taha and Alahmad, Mohammad A. (2013) Cryptographic hash function: A high level view. In: International Conference on Informatics and Creative Multimedia (ICICM), 2013, 4-6 September 2013, Kuala Lumpur, Malaysia. http://dx.doi.org/10.1109/ICICM.2013.29 doi:10.1109/ICICM.2013.29 |
institution |
Universiti Islam Antarabangsa Malaysia |
building |
IIUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
International Islamic University Malaysia |
content_source |
IIUM Repository (IREP) |
url_provider |
http://irep.iium.edu.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Alkandari, Abdulaziz Ali Alshaikhli, Imad Fakhri Taha Alahmad, Mohammad A. Cryptographic hash function: A high level view |
description |
Cryptographic hash function verifies data integrity and
sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This paper provides a detailed overview to include classification, properties, constructions, attacks, applications and an
overview of a selected dedicated cryptographic hash function. |
format |
Conference or Workshop Item |
author |
Alkandari, Abdulaziz Ali Alshaikhli, Imad Fakhri Taha Alahmad, Mohammad A. |
author_facet |
Alkandari, Abdulaziz Ali Alshaikhli, Imad Fakhri Taha Alahmad, Mohammad A. |
author_sort |
Alkandari, Abdulaziz Ali |
title |
Cryptographic hash function: A high level view |
title_short |
Cryptographic hash function: A high level view |
title_full |
Cryptographic hash function: A high level view |
title_fullStr |
Cryptographic hash function: A high level view |
title_full_unstemmed |
Cryptographic hash function: A high level view |
title_sort |
cryptographic hash function: a high level view |
publishDate |
2013 |
url |
http://irep.iium.edu.my/36069/1/icicm13-paper-1.pdf http://irep.iium.edu.my/36069/ http://dx.doi.org/10.1109/ICICM.2013.29 |
_version_ |
1643610909688463360 |
score |
13.160551 |