Cryptographic Hash Functions
Gauravaram, Praveen & Knudsen, Lars R. (2011) Cryptographic Hash Functions. In Encyclopedia of Information Assurance. Taylor & Francis.
In the modern era of information and communication technology, cryptographic hash functions play an important role in ensuring the authenticity, integrity, and nonrepudiation goals of information security as well as efficient information processing. This entry provides an overview of the role of hash functions in information security, popular hash function designs, some important analytical results, and recent advances in this field.
Impact and interest:
Citation counts are sourced monthly from and citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
|Item Type:||Reference Entry|
|Additional Information:||DOI 10.1081/E-EIA-120047187|
|Keywords:||SHA-3 cryptographic hash function competition, Collision attack, Merkle-Damgård construction, Second preimage attack, Hash function, Compression function, Preimage attack|
|Divisions:||Current > Schools > School of Electrical Engineering & Computer Science
Current > QUT Faculties and Divisions > Science & Engineering Faculty
|Copyright Owner:||Copyright 2011 Taylor & Francis|
|Deposited On:||09 Feb 2015 03:12|
|Last Modified:||10 Oct 2015 14:15|
Repository Staff Only: item control page