Login / Signup
Cryptographic Hash Functions: Recent Design Trends and Security Notions.
Saif Al-Kuwari
James H. Davenport
Russell J. Bradford
Published in:
IACR Cryptol. ePrint Arch. (2011)
Keyphrases
</>
hash functions
block cipher
encryption scheme
stream cipher
high assurance
similarity search
smart card
information security
provably secure
databases
data mining
authentication protocol
security properties
hashing algorithm