Cryptographic hash function: A high level view

Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This paper provides a detailed overview to include classification, properties, const...

Full description

Saved in:
Bibliographic Details
Main Authors: Alkandari, Abdulaziz Ali, Alshaikhli, Imad Fakhri Taha, Alahmad, Mohammad A.
Format: Conference or Workshop Item
Language:English
Published: 2013
Subjects:
Online Access:http://irep.iium.edu.my/36069/1/icicm13-paper-1.pdf
http://irep.iium.edu.my/36069/
http://dx.doi.org/10.1109/ICICM.2013.29
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.iium.irep.36069
record_format dspace
spelling my.iium.irep.360692014-03-17T06:55:58Z http://irep.iium.edu.my/36069/ Cryptographic hash function: A high level view Alkandari, Abdulaziz Ali Alshaikhli, Imad Fakhri Taha Alahmad, Mohammad A. QA75 Electronic computers. Computer science Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This paper provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash function. 2013-09-04 Conference or Workshop Item REM application/pdf en http://irep.iium.edu.my/36069/1/icicm13-paper-1.pdf Alkandari, Abdulaziz Ali and Alshaikhli, Imad Fakhri Taha and Alahmad, Mohammad A. (2013) Cryptographic hash function: A high level view. In: International Conference on Informatics and Creative Multimedia (ICICM), 2013, 4-6 September 2013, Kuala Lumpur, Malaysia. http://dx.doi.org/10.1109/ICICM.2013.29 doi:10.1109/ICICM.2013.29
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Alkandari, Abdulaziz Ali
Alshaikhli, Imad Fakhri Taha
Alahmad, Mohammad A.
Cryptographic hash function: A high level view
description Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This paper provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash function.
format Conference or Workshop Item
author Alkandari, Abdulaziz Ali
Alshaikhli, Imad Fakhri Taha
Alahmad, Mohammad A.
author_facet Alkandari, Abdulaziz Ali
Alshaikhli, Imad Fakhri Taha
Alahmad, Mohammad A.
author_sort Alkandari, Abdulaziz Ali
title Cryptographic hash function: A high level view
title_short Cryptographic hash function: A high level view
title_full Cryptographic hash function: A high level view
title_fullStr Cryptographic hash function: A high level view
title_full_unstemmed Cryptographic hash function: A high level view
title_sort cryptographic hash function: a high level view
publishDate 2013
url http://irep.iium.edu.my/36069/1/icicm13-paper-1.pdf
http://irep.iium.edu.my/36069/
http://dx.doi.org/10.1109/ICICM.2013.29
_version_ 1643610909688463360
score 13.160551