Broad view of cryptographic hash functions

Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cry...

Full description

Bibliographic Details
Main Authors: Alahmad, Mohammad, Alshaikhli, Imad Fakhri Taha
Format: Article
Language:English
Published: IJCSI Press 2013
Subjects:
Online Access:http://irep.iium.edu.my/34636/
http://irep.iium.edu.my/34636/1/IJCSI-10-4-1-239-246.pdf
_version_ 1848780938323951616
author Alahmad, Mohammad
Alshaikhli, Imad Fakhri Taha
author_facet Alahmad, Mohammad
Alshaikhli, Imad Fakhri Taha
author_sort Alahmad, Mohammad
building IIUM Repository
collection Online Access
description Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cryptographic hash functions. It includes the properties, classification, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash functions.
first_indexed 2025-11-14T15:41:37Z
format Article
id iium-34636
institution International Islamic University Malaysia
institution_category Local University
language English
last_indexed 2025-11-14T15:41:37Z
publishDate 2013
publisher IJCSI Press
recordtype eprints
repository_type Digital Repository
spelling iium-346362014-01-20T01:46:35Z http://irep.iium.edu.my/34636/ Broad view of cryptographic hash functions Alahmad, Mohammad Alshaikhli, Imad Fakhri Taha QA75 Electronic computers. Computer science Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cryptographic hash functions. It includes the properties, classification, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash functions. IJCSI Press 2013-07 Article PeerReviewed application/pdf en http://irep.iium.edu.my/34636/1/IJCSI-10-4-1-239-246.pdf Alahmad, Mohammad and Alshaikhli, Imad Fakhri Taha (2013) Broad view of cryptographic hash functions. International Journal of Computer Science Issues (IJCSI), 10 (4). pp. 239-246. ISSN 1694-0814 http://ijcsi.org/papers/IJCSI-10-4-1-239-246.pdf
spellingShingle QA75 Electronic computers. Computer science
Alahmad, Mohammad
Alshaikhli, Imad Fakhri Taha
Broad view of cryptographic hash functions
title Broad view of cryptographic hash functions
title_full Broad view of cryptographic hash functions
title_fullStr Broad view of cryptographic hash functions
title_full_unstemmed Broad view of cryptographic hash functions
title_short Broad view of cryptographic hash functions
title_sort broad view of cryptographic hash functions
topic QA75 Electronic computers. Computer science
url http://irep.iium.edu.my/34636/
http://irep.iium.edu.my/34636/
http://irep.iium.edu.my/34636/1/IJCSI-10-4-1-239-246.pdf