Cryptographic hash functions

Encyclopedia of Database Systems, 2009.

被引用0|浏览8
EI

摘要

Cryptographic hash functions have grown to be some of the most widely-used objects from cryptography. Typically they are built from smaller, well-defined primitives known as compression functions using the celebrated result from Merkle and Damgård to extend the domain. This research takes a comprehensive look at these primitives, providin...更多

代码

数据

24小时获取PDF
引用
您的评分 :
0

 

标签
评论