Classification of Hash Functions Suitable for Real-Life Systems


Cryptographic hash functions have been widely studied and are used in many current systems. Though much re­ search has been done on the security of hash functions, system designers cannot determine which hash function is most suitable for a particular system. The main reason for this is that the current security classification does not cor­ respond very… (More)
DOI: 10.1093/ietfec/e91-a.1.64
View Slides


  • Presentations referencing similar topics