Cryptographic hash functions
Encyclopedia of Database Systems, 2009.
Cryptographic hash functions have grown to be some of the most widely-used objects from cryptography. Typically they are built from smaller, well-defined primitives known as compression functions using the celebrated result from Merkle and Damgård to extend the domain. This research takes a comprehensive look at these primitives, providin...更多
下载 PDF 全文 (上传PDF)