In many cryptographic applications, it is necessary to produce a relatively short fingerprint of a much longer message or electronic document. The fingerprint is also called a digest of the message. Cryptographic applications of hashing include, among others, the generation of digital signatures.
CITATION STYLE
Pieprzyk, J., Hardjono, T., & Seberry, J. (2003). Hashing. In Fundamentals of Computer Security (pp. 243–281). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-662-07324-7_6
Mendeley helps you to discover research relevant for your work.