Cryptographic hash functions [electronic resource]
Cryptographic hash functions have grown to be some of the most widely-used objects from cryptography. Typically they are built from smaller, well-defined primitives known as compression functions using the celebrated result from Merkle and Damgard to extend the domain. This research takes a comprehe...
Saved in:
Online Access: |
Online Access |
---|---|
Main Author: | |
Other Authors: | |
Format: | Thesis Electronic eBook |
Language: | English |
Published: |
2008.
|
Subjects: |