Cryptographic Hash Functions


Autoria(s): Gauravaram, Praveen; Knudsen, Lars R.
Data(s)

21/10/2011

Resumo

In the modern era of information and communication technology, cryptographic hash functions play an important role in ensuring the authenticity, integrity, and nonrepudiation goals of information security as well as efficient information processing. This entry provides an overview of the role of hash functions in information security, popular hash function designs, some important analytical results, and recent advances in this field.

Identificador

http://eprints.qut.edu.au/81697/

Publicador

Taylor & Francis

Relação

http://www.tandfonline.com/doi/abs/10.1081/E-EIA-120047187#.VNgkiBBQAzT

Gauravaram, Praveen & Knudsen, Lars R. (2011) Cryptographic Hash Functions. In Encyclopedia of Information Assurance. Taylor & Francis.

Direitos

Copyright 2011 Taylor & Francis

Fonte

School of Electrical Engineering & Computer Science; Science & Engineering Faculty

Palavras-Chave #SHA-3 cryptographic hash function competition #Collision attack #Merkle-Damgård construction #Second preimage attack #Hash function #Compression function #Preimage attack
Tipo

Reference Entry