Breadcrumbs Section. Click here to navigate to respective pages.
Chapter

Chapter
Hash Functions and Data Integrity
DOI link for Hash Functions and Data Integrity
Hash Functions and Data Integrity book
Hash Functions and Data Integrity
DOI link for Hash Functions and Data Integrity
Hash Functions and Data Integrity book
ByAlfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
Edition 1st Edition
First Published 1997
Imprint CRC Press
Pages 63
eBook ISBN 9780429466335
ABSTRACT
Cryptographic hash functions play a fundamental role in modern cryptography. While related to conventional hash functions commonly used in non-cryptographic computer applications – in both cases, larger domains are mapped to smaller ranges – they differ in several important aspects. Our focus is restricted to cryptographic hash functions (hereafter, simply hash functions), and in particular to their use for data integrity and message authentication.