Broad view of cryptographic hash functions
Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cry...
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IJCSI Press
2013
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/34636/ http://irep.iium.edu.my/34636/1/IJCSI-10-4-1-239-246.pdf |
| _version_ | 1848780938323951616 |
|---|---|
| author | Alahmad, Mohammad Alshaikhli, Imad Fakhri Taha |
| author_facet | Alahmad, Mohammad Alshaikhli, Imad Fakhri Taha |
| author_sort | Alahmad, Mohammad |
| building | IIUM Repository |
| collection | Online Access |
| description | Cryptographic hash function is a function that takes an arbitrary length
as an input and produces a fixed size of an output. The viability of using
cryptographic hash function is to verify data integrity and sender identity
or source of information. This paper provides a detailed overview of
cryptographic hash functions. It includes the properties, classification,
constructions, attacks, applications and an overview of a selected
dedicated cryptographic hash functions. |
| first_indexed | 2025-11-14T15:41:37Z |
| format | Article |
| id | iium-34636 |
| institution | International Islamic University Malaysia |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-14T15:41:37Z |
| publishDate | 2013 |
| publisher | IJCSI Press |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | iium-346362014-01-20T01:46:35Z http://irep.iium.edu.my/34636/ Broad view of cryptographic hash functions Alahmad, Mohammad Alshaikhli, Imad Fakhri Taha QA75 Electronic computers. Computer science Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cryptographic hash functions. It includes the properties, classification, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash functions. IJCSI Press 2013-07 Article PeerReviewed application/pdf en http://irep.iium.edu.my/34636/1/IJCSI-10-4-1-239-246.pdf Alahmad, Mohammad and Alshaikhli, Imad Fakhri Taha (2013) Broad view of cryptographic hash functions. International Journal of Computer Science Issues (IJCSI), 10 (4). pp. 239-246. ISSN 1694-0814 http://ijcsi.org/papers/IJCSI-10-4-1-239-246.pdf |
| spellingShingle | QA75 Electronic computers. Computer science Alahmad, Mohammad Alshaikhli, Imad Fakhri Taha Broad view of cryptographic hash functions |
| title | Broad view of cryptographic hash functions |
| title_full | Broad view of cryptographic hash functions |
| title_fullStr | Broad view of cryptographic hash functions |
| title_full_unstemmed | Broad view of cryptographic hash functions |
| title_short | Broad view of cryptographic hash functions |
| title_sort | broad view of cryptographic hash functions |
| topic | QA75 Electronic computers. Computer science |
| url | http://irep.iium.edu.my/34636/ http://irep.iium.edu.my/34636/ http://irep.iium.edu.my/34636/1/IJCSI-10-4-1-239-246.pdf |