Κεφάλαιο 8Adobe PDF (311.96 kB)
Title Details:
Hash Functions
Authors: Pagourtzis, Aristeidis
Zachos, Efstathios
Grontas, Panagiotis
Reviewer: Poulakis, Dimitrios
Subject: MATHEMATICS AND COMPUTER SCIENCE > > >
MATHEMATICS AND COMPUTER SCIENCE >
NATURAL SCIENCES AND AGRICULTURAL SCIENCES > PHYSICS > INDERDISCIPLINARY PHYSICS AND RELATED AREAS OF SCIENCE AND TECHNOLOGY > >
ENGINEERING AND TECHNOLOGY > > >
MATHEMATICS AND COMPUTER SCIENCE > >
MATHEMATICS AND COMPUTER SCIENCE > >
MATHEMATICS AND COMPUTER SCIENCE > MATHEMATICS > NUMBER THEORY > COMPUTATIONAL NUMBER THEORY
Description:
Abstract:
Hash functions: definition. Security: resistance to first and second preimage attacks, collision resistance, one-way property. Hierarchy of security properties. Birthday paradox attack. Chaum-van Heijst-Pfitzmann hash function: collision resistance equivalent to the Discrete Logarithm assumption. Merkle-Damgard method for extending hash functions. The Random Oracle model.
Type: Chapter
Creation Date: 2015
Item Details:
License: Attribution - NonCommercial - ShareAlike 4.0 International (CC BY-NC-SA 4.0)
Handle http://hdl.handle.net/11419/5447
Bibliographic Reference: Pagourtzis, A., Zachos, E., & Grontas, P. (2015). Hash Functions [Chapter]. In Pagourtzis, A., Zachos, E., & Grontas, P. 2015. Computational Cryptography [Undergraduate textbook]. Kallipos, Open Academic Editions. https://hdl.handle.net/11419/5447
Language: Greek
Is Part of: Computational Cryptography
Publication Origin: Kallipos, Open Academic Editions