ABSTRACT

This chapter summarizes the development in the field of cryptographic hash functions in the last 20 years. It gives both theoretical foundations as well as a broad list of applications of cryptographic hash functions in numerous algorithms, protocols, and schemes in the field of information security.