Cryptographic Hash Functions

Gauravaram, Praveen & Knudsen, Lars R. (2011) Cryptographic Hash Functions. In Encyclopedia of Information Assurance. Taylor & Francis.

View at publisher

Abstract

In the modern era of information and communication technology, cryptographic hash functions play an important role in ensuring the authenticity, integrity, and nonrepudiation goals of information security as well as efficient information processing. This entry provides an overview of the role of hash functions in information security, popular hash function designs, some important analytical results, and recent advances in this field.

Impact and interest:

Citation counts are sourced monthly from Scopus and Web of Science® citation databases.

These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

ID Code: 81697
Item Type: Reference Entry
Additional Information: DOI 10.1081/E-EIA-120047187
Additional URLs:
Keywords: SHA-3 cryptographic hash function competition, Collision attack, Merkle-Damgård construction, Second preimage attack, Hash function, Compression function, Preimage attack
ISBN: 1-4200-6620-X
Divisions: Current > Schools > School of Electrical Engineering & Computer Science
Current > QUT Faculties and Divisions > Science & Engineering Faculty
Copyright Owner: Copyright 2011 Taylor & Francis
Deposited On: 09 Feb 2015 03:12
Last Modified: 10 Oct 2015 14:15

Export: EndNote | Dublin Core | BibTeX

Repository Staff Only: item control page