Cryptographic Hash Functions
Author: Kelvin W. Macharia
*Wait a few seconds for the document to load, the time may vary depending on your internet connection. If you prefer, you can download the file by clicking on the link below.
Information
Description: Cryptographic Hash Functions by Kelvin W. Macharia provides an overview of cryptographic hash functions, explaining their properties and security aspects. This document is valuable for anyone seeking a concise understanding of hash functions and their role in securing data.
Pages: 10
Megabytes: 0.23 MB
This may interest you
Design and analysis of cryptographic algorithms
Extension: PDF | 273 pages
Design and analysis of cryptographic algorithms por Kolbl, Stefan is a PhD thesis providing a comprehensive introduction to block ciphers and hash functions. It offers a deep dive into security analysis and design principles, making it valuable for anyone seeking a solid foundation in cryptography.
Implementation of cryptographic algorithms and protocols
Extension: PDF | 61 pages
Implementation of cryptographic algorithms and protocols por Omkar Guru, Sanjay Majumdar and Krithika K details the implementation of symmetric and asymmetric cryptography, including DES, AES, RSA, and ECC, along with digital signature protocols. It offers a practical survey valuable for those seeking a foundational understanding of cryptography.
Introduction to the hash function as a personal data pseudonymisation technique
Extension: PDF | 31 pages
Introduction to the hash function as a personal data pseudonymisation technique por AEPD analyzes hash functions for personal data protection, highlighting risks and mitigation strategies. It's a valuable resource for understanding data privacy implications of cryptography in data processing.
Cryptographic hash functions – an overview
Extension: PDF | 22 pages
Cryptographic hash functions - an overview por Bart Preneel presents a comprehensive look at cryptographic hash functions, essential for data integrity and authentication. This paper defines different hash function types, explores attacks, and surveys practical constructions, offering valuable insights.
Cryptographic Algorithms and Protocols
Extension: PDF | 10 pages
Cryptographic Algorithms and Protocols por Mohammad Khalid Imam Rahmani provides a technical overview of essential cryptographic algorithms and protocols. It explores the fundamentals of cryptography, offering a solid foundation for understanding modern information security.