On the Use of Cryptographic Dedicated Hash Functions for Digital Signatures

Saved in:
Bibliographic Details
Title: On the Use of Cryptographic Dedicated Hash Functions for Digital Signatures
Authors: Akram A. M. Naji, Yahya Abuhasan
Contributors: The Pennsylvania State University CiteSeerX Archives
Source: http://www.mat.usm.my/research/onlineproc/cs07.pdf.
Collection: CiteSeerX
Subject Terms: literature, hashcode, hash total, hash result, imprint, checksum, compression, compressed encoding, seal, authenticator, authentication tag, fingerprint, test key, condensation, Message Integrity Code (MIC, message digest, etc [21]. They are an important block
Description: Cryptographic hash functions are an important building block for a wide range of applications such as digital signatures. In this paper, we give an overview of cryptographic hash functions; classification, definitions, and their basic security. We give special emphasis on cryptographic dedicated hash functions with summarizing the recent attacks on MD5 and SHA-1. Finally, we discuss the design and security of the hash functions SHA-family. Key words and phrases: hash functions, digital signature, dedicated hash functions 1.
Document Type: text
File Description: application/pdf
Language: English
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.2317; http://www.mat.usm.my/research/onlineproc/cs07.pdf
Availability: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.2317
http://www.mat.usm.my/research/onlineproc/cs07.pdf
Rights: Metadata may be used without restrictions as long as the oai identifier remains attached to it.
Accession Number: edsbas.AB6FC3C8
Database: BASE
Be the first to leave a comment!
You must be logged in first