作者
Bart Preneel
发表日期
1994/7
期刊
European Transactions on Telecommunications
卷号
5
期号
4
页码范围
431-448
出版商
Wiley Subscription Services, Inc., A Wiley Company
简介
Hash functions were introduced in cryptology in the late seventies as a tool to protect the authenticity of information. Soon it became clear that they were a very useful building block to solve other security problems in telecommunication and computer networks. This paper sketches the history of the concept, discusses the applications of hash functions, and presents the approaches that have been followed to construct hash functions. In addition, it tries to provide the information which is necessary to choose a practical hash function. An overview of practical constructions and their performance is given and some attacks are discussed. Special attention is paid to standards dealing with hash functions.
引用总数
199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242467422423263433610121313188141316171418211924
学术搜索中的文章
B Preneel - European Transactions on Telecommunications, 1994