Cryptographic hash functions

1Citations
Citations of this article
218Readers
Mendeley users who have this article in their library.

Abstract

This chapter summarizes the development in the field of cryptographic hash functions in the last 20 years. It gives both theoretical foundations as well as a broad list of applications of cryptographic hash functions in numerous algorithms, protocols, and schemes in the field of information security.

Cite

CITATION STYLE

APA

Gligoroski, D. (2011). Cryptographic hash functions. In A Multidisciplinary Introduction to Information Security (pp. 49–72). CRC Press. https://doi.org/10.1587/essfr.4.57

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free