Title Details: | |
Hash Functions |
|
Authors: |
Pagourtzis, Aristeidis Zachos, Efstathios Grontas, Panagiotis |
Reviewer: |
Poulakis, Dimitrios |
Subject: | MATHEMATICS AND COMPUTER SCIENCE > > > MATHEMATICS AND COMPUTER SCIENCE > NATURAL SCIENCES AND AGRICULTURAL SCIENCES > PHYSICS > INDERDISCIPLINARY PHYSICS AND RELATED AREAS OF SCIENCE AND TECHNOLOGY > > ENGINEERING AND TECHNOLOGY > > > MATHEMATICS AND COMPUTER SCIENCE > > MATHEMATICS AND COMPUTER SCIENCE > > MATHEMATICS AND COMPUTER SCIENCE > MATHEMATICS > NUMBER THEORY > COMPUTATIONAL NUMBER THEORY |
Description: | |
Abstract: |
Hash functions: definition. Security: resistance to first and second preimage attacks, collision resistance, one-way property. Hierarchy of security properties. Birthday paradox attack. Chaum-van Heijst-Pfitzmann hash function: collision resistance equivalent to the Discrete Logarithm assumption. Merkle-Damgard method for extending hash functions. The Random Oracle model.
|
Type: |
Chapter |
Creation Date: | 2015 |
Item Details: | |
License: |
Attribution - NonCommercial - ShareAlike 4.0 International (CC BY-NC-SA 4.0) |
Handle | http://hdl.handle.net/11419/5447 |
Bibliographic Reference: | Pagourtzis, A., Zachos, E., & Grontas, P. (2015). Hash Functions [Chapter]. In Pagourtzis, A., Zachos, E., & Grontas, P. 2015. Computational Cryptography [Undergraduate textbook]. Kallipos, Open Academic Editions. https://hdl.handle.net/11419/5447 |
Language: |
Greek |
Is Part of: |
Computational Cryptography |
Publication Origin: |
Kallipos, Open Academic Editions |