Integrated-key cryptographic hash functions

Cryptographic hash functions have always played a major role in most cryptographic applications. Traditionally, hash functions were designed in the keyless setting, where a hash function accepts a variable-length message and returns a fixed-length fingerprint. Unfortunately, over the years, signific...

Full description

Bibliographic Details
Main Author: Al-Kuwari, Saif
Other Authors: Davenport, James ; Bradford, Russell
Published: University of Bath 2011
Subjects:
Online Access:https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.545328