Cryptographic hash function: a high level view

Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This chapter provides a detailed overview to include classification, properties, cons...

Full description

Saved in:
Bibliographic Details
Main Authors: Taha, Imad, Alahmad, Mohammad A.
Other Authors: alhamami, Alaa
Format: Book Chapter
Language:English
Published: IGI Global 2015
Subjects:
Online Access:http://irep.iium.edu.my/46830/5/Book-Chapter-Completed.pdf
http://irep.iium.edu.my/46830/
http://www.igi-global.com
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.iium.irep.46830
record_format dspace
spelling my.iium.irep.468302016-07-26T07:55:32Z http://irep.iium.edu.my/46830/ Cryptographic hash function: a high level view Taha, Imad Alahmad, Mohammad A. QA75 Electronic computers. Computer science Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This chapter provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash function. IGI Global alhamami, Alaa 2015 Book Chapter REM application/pdf en http://irep.iium.edu.my/46830/5/Book-Chapter-Completed.pdf Taha, Imad and Alahmad, Mohammad A. (2015) Cryptographic hash function: a high level view. In: Threat Detection and Countermeasures in Network Security. IGI Global, USA, pp. 80-94. ISBN 978-1-4666-6583-5 http://www.igi-global.com
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Taha, Imad
Alahmad, Mohammad A.
Cryptographic hash function: a high level view
description Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This chapter provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash function.
author2 alhamami, Alaa
author_facet alhamami, Alaa
Taha, Imad
Alahmad, Mohammad A.
format Book Chapter
author Taha, Imad
Alahmad, Mohammad A.
author_sort Taha, Imad
title Cryptographic hash function: a high level view
title_short Cryptographic hash function: a high level view
title_full Cryptographic hash function: a high level view
title_fullStr Cryptographic hash function: a high level view
title_full_unstemmed Cryptographic hash function: a high level view
title_sort cryptographic hash function: a high level view
publisher IGI Global
publishDate 2015
url http://irep.iium.edu.my/46830/5/Book-Chapter-Completed.pdf
http://irep.iium.edu.my/46830/
http://www.igi-global.com
_version_ 1643613070514192384
score 13.160551