Cryptographic hash functions [electronic resource]

Cryptographic hash functions have grown to be some of the most widely-used objects from cryptography. Typically they are built from smaller, well-defined primitives known as compression functions using the celebrated result from Merkle and Damgard to extend the domain. This research takes a comprehe...

Full description

Saved in:
Bibliographic Details
Online Access: Online Access
Main Author: Cochran, Martin J.
Other Authors: Black, John (advisor.)
Format: Thesis Electronic eBook
Language:English
Published: 2008.
Subjects:

Internet

Online Access

Online

Holdings details from Online
Available