Lectures on Data Security, vol. 1561, issue Lecture Notes in Computer Science (1999) pp. 158-182
This paper describes the state of the art for cryptographic hash functions. Different definitions are compared, and the few theoretical results on hash functions are discussed. A brief overview is presented of the most important constructions, and some open problems are presented.
Mendeley saves you time finding and organizing research
Choose a citation style from the tabs below