This chapter summarizes the development in the field of cryptographic hash functions in the last 20 years. It gives both theoretical foundations as well as a broad list of applications of cryptographic hash functions in numerous algorithms, protocols, and schemes in the field of information security.
CITATION STYLE
Gligoroski, D. (2011). Cryptographic hash functions. In A Multidisciplinary Introduction to Information Security (pp. 49–72). CRC Press. https://doi.org/10.1587/essfr.4.57
Mendeley helps you to discover research relevant for your work.