On the Use of Cryptographic Dedicated Hash Functions for Digital Signatures
Saved in:
| Title: | On the Use of Cryptographic Dedicated Hash Functions for Digital Signatures |
|---|---|
| Authors: | Akram A. M. Naji, Yahya Abuhasan |
| Contributors: | The Pennsylvania State University CiteSeerX Archives |
| Source: | http://www.mat.usm.my/research/onlineproc/cs07.pdf. |
| Collection: | CiteSeerX |
| Subject Terms: | literature, hashcode, hash total, hash result, imprint, checksum, compression, compressed encoding, seal, authenticator, authentication tag, fingerprint, test key, condensation, Message Integrity Code (MIC, message digest, etc [21]. They are an important block |
| Description: | Cryptographic hash functions are an important building block for a wide range of applications such as digital signatures. In this paper, we give an overview of cryptographic hash functions; classification, definitions, and their basic security. We give special emphasis on cryptographic dedicated hash functions with summarizing the recent attacks on MD5 and SHA-1. Finally, we discuss the design and security of the hash functions SHA-family. Key words and phrases: hash functions, digital signature, dedicated hash functions 1. |
| Document Type: | text |
| File Description: | application/pdf |
| Language: | English |
| Relation: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.2317; http://www.mat.usm.my/research/onlineproc/cs07.pdf |
| Availability: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.2317 http://www.mat.usm.my/research/onlineproc/cs07.pdf |
| Rights: | Metadata may be used without restrictions as long as the oai identifier remains attached to it. |
| Accession Number: | edsbas.AB6FC3C8 |
| Database: | BASE |
Be the first to leave a comment!
Nájsť tento článok vo Web of Science