Comparison of hash function algorithms against attacks: a review
Hash functions are considered key components of nearly all cryptographic protocols, as well as of many security applications such as message authentication codes, data integrity, password storage, and random number generation. Many hash function algorithms have been proposed in order to ensure authe...
Saved in:
Main Authors: | , , , , , |
---|---|
格式: | Article |
語言: | English |
出版: |
Science and Information Organization
2018
|
主題: | |
在線閱讀: | http://eprints.utm.my/id/eprint/84578/1/AliMaetouq2018_ComparisonofHashFunctionAlgorithmsAgainst.pdf http://eprints.utm.my/id/eprint/84578/ http://dx.doi.org/10.14569/IJACSA.2018.090813 |
標簽: |
添加標簽
沒有標簽, 成為第一個標記此記錄!
|