Hashing

  • Pieprzyk J
  • Hardjono T
  • Seberry J
N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In many cryptographic applications, it is necessary to produce a relatively short fingerprint of a much longer message or electronic document. The fingerprint is also called a digest of the message. Cryptographic applications of hashing include, among others, the generation of digital signatures.

Cite

CITATION STYLE

APA

Pieprzyk, J., Hardjono, T., & Seberry, J. (2003). Hashing. In Fundamentals of Computer Security (pp. 243–281). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-662-07324-7_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free