Cryptographic hash function: a high level view
Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This chapter provides a detailed overview to include classification, properties, cons...
Saved in:
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Book Chapter |
Language: | English |
Published: |
IGI Global
2015
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/46830/5/Book-Chapter-Completed.pdf http://irep.iium.edu.my/46830/ http://www.igi-global.com |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.iium.irep.46830 |
---|---|
record_format |
dspace |
spelling |
my.iium.irep.468302016-07-26T07:55:32Z http://irep.iium.edu.my/46830/ Cryptographic hash function: a high level view Taha, Imad Alahmad, Mohammad A. QA75 Electronic computers. Computer science Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This chapter provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash function. IGI Global alhamami, Alaa 2015 Book Chapter REM application/pdf en http://irep.iium.edu.my/46830/5/Book-Chapter-Completed.pdf Taha, Imad and Alahmad, Mohammad A. (2015) Cryptographic hash function: a high level view. In: Threat Detection and Countermeasures in Network Security. IGI Global, USA, pp. 80-94. ISBN 978-1-4666-6583-5 http://www.igi-global.com |
institution |
Universiti Islam Antarabangsa Malaysia |
building |
IIUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
International Islamic University Malaysia |
content_source |
IIUM Repository (IREP) |
url_provider |
http://irep.iium.edu.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Taha, Imad Alahmad, Mohammad A. Cryptographic hash function: a high level view |
description |
Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This chapter provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash function.
|
author2 |
alhamami, Alaa |
author_facet |
alhamami, Alaa Taha, Imad Alahmad, Mohammad A. |
format |
Book Chapter |
author |
Taha, Imad Alahmad, Mohammad A. |
author_sort |
Taha, Imad |
title |
Cryptographic hash function: a high level view |
title_short |
Cryptographic hash function: a high level view |
title_full |
Cryptographic hash function: a high level view |
title_fullStr |
Cryptographic hash function: a high level view |
title_full_unstemmed |
Cryptographic hash function: a high level view |
title_sort |
cryptographic hash function: a high level view |
publisher |
IGI Global |
publishDate |
2015 |
url |
http://irep.iium.edu.my/46830/5/Book-Chapter-Completed.pdf http://irep.iium.edu.my/46830/ http://www.igi-global.com |
_version_ |
1643613070514192384 |
score |
13.160551 |