Abstract
In this chapter, we discuss cryptographic hash functions. They are used, for example, in digital signatures. Throughout this chapter, we assume that Σ is an alphabet.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag New York, Inc.
About this chapter
Cite this chapter
Buchmann, J.A. (2001). Cryptographic Hash Functions. In: Introduction to Cryptography. Undergraduate Texts in Mathematics. Springer, New York, NY. https://doi.org/10.1007/978-1-4684-0496-8_10
Download citation
DOI: https://doi.org/10.1007/978-1-4684-0496-8_10
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4684-0498-2
Online ISBN: 978-1-4684-0496-8
eBook Packages: Springer Book Archive