Cryptographic Hash Functions

Author: Kelvin W. Macharia

*Wait a few seconds for the document to load, the time may vary depending on your internet connection. If you prefer, you can download the file by clicking on the link below.

Information

Description: Cryptographic Hash Functions by Kelvin W. Macharia provides an overview of cryptographic hash functions, explaining their properties and security aspects. This document is valuable for anyone seeking a concise understanding of hash functions and their role in securing data.

Pages: 10

Megabytes: 0.23 MB

Download

This may interest you

Design and analysis of cryptographic algorithms

Design and analysis of cryptographic algorithms

Extension: PDF | 273 pages

Design and analysis of cryptographic algorithms por Kolbl, Stefan is a PhD thesis providing a comprehensive introduction to block ciphers and hash functions. It offers a deep dive into security analysis and design principles, making it valuable for anyone seeking a solid foundation in cryptography.

Implementation of cryptographic algorithms and protocols

Implementation of cryptographic algorithms and protocols

Extension: PDF | 61 pages

Implementation of cryptographic algorithms and protocols por Omkar Guru, Sanjay Majumdar and Krithika K details the implementation of symmetric and asymmetric cryptography, including DES, AES, RSA, and ECC, along with digital signature protocols. It offers a practical survey valuable for those seeking a foundational understanding of cryptography.

Introduction to the hash function as a personal data pseudonymisation technique

Introduction to the hash function as a personal data pseudonymisation technique

Extension: PDF | 31 pages

Introduction to the hash function as a personal data pseudonymisation technique por AEPD analyzes hash functions for personal data protection, highlighting risks and mitigation strategies. It's a valuable resource for understanding data privacy implications of cryptography in data processing.

Cryptographic hash functions – an overview

Cryptographic hash functions - an overview

Extension: PDF | 22 pages

Cryptographic hash functions - an overview por Bart Preneel presents a comprehensive look at cryptographic hash functions, essential for data integrity and authentication. This paper defines different hash function types, explores attacks, and surveys practical constructions, offering valuable insights.

Cryptographic Algorithms and Protocols

Cryptographic Algorithms and Protocols

Extension: PDF | 10 pages

Cryptographic Algorithms and Protocols por Mohammad Khalid Imam Rahmani provides a technical overview of essential cryptographic algorithms and protocols. It explores the fundamentals of cryptography, offering a solid foundation for understanding modern information security.