Cryptographic Hash Functions
Data(s) |
21/10/2011
|
---|---|
Resumo |
In the modern era of information and communication technology, cryptographic hash functions play an important role in ensuring the authenticity, integrity, and nonrepudiation goals of information security as well as efficient information processing. This entry provides an overview of the role of hash functions in information security, popular hash function designs, some important analytical results, and recent advances in this field. |
Identificador | |
Publicador |
Taylor & Francis |
Relação |
http://www.tandfonline.com/doi/abs/10.1081/E-EIA-120047187#.VNgkiBBQAzT Gauravaram, Praveen & Knudsen, Lars R. (2011) Cryptographic Hash Functions. In Encyclopedia of Information Assurance. Taylor & Francis. |
Direitos |
Copyright 2011 Taylor & Francis |
Fonte |
School of Electrical Engineering & Computer Science; Science & Engineering Faculty |
Palavras-Chave | #SHA-3 cryptographic hash function competition #Collision attack #Merkle-Damgård construction #Second preimage attack #Hash function #Compression function #Preimage attack |
Tipo |
Reference Entry |