Abstract
This chapter summarizes the development in the field of cryptographic hash functions in the last 20 years. It gives both theoretical foundations as well as a broad list of applications of cryptographic hash functions in numerous algorithms, protocols, and schemes in the field of information security.
Cite
CITATION STYLE
APA
Gligoroski, D. (2011). Cryptographic hash functions. In A Multidisciplinary Introduction to Information Security (pp. 49–72). CRC Press. https://doi.org/10.1587/essfr.4.57
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.
Already have an account? Sign in
Sign up for free