LEADER 03849nam 22007695 450 001 996466067303316 005 20200705142115.0 010 $a3-540-48198-2 024 7 $a10.1007/3-540-57500-6 035 $a(CKB)1000000000234058 035 $a(SSID)ssj0000322536 035 $a(PQKBManifestationID)11937865 035 $a(PQKBTitleCode)TC0000322536 035 $a(PQKBWorkID)10288076 035 $a(PQKB)10450296 035 $a(DE-He213)978-3-540-48198-0 035 $a(PPN)155213466 035 $a(EXLCZ)991000000000234058 100 $a20121227d1993 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDesign of Hashing Algorithms$b[electronic resource] /$fby Josef Pieprzyk, Babak Sadeghiyan 205 $a1st ed. 1993. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d1993. 215 $a1 online resource (XV, 196 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v756 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-57500-6 327 $aOverview of hash functions -- Methods of attack on hash functions -- Pseudorandomness -- Construction of super-pseudorandom permutations -- A sound structure -- A construction for one way hash functions and pseudorandom bit generators -- How to construct a family of strong one-way permutations -- Conclusions. 330 $aThis work presents recent developments in hashing algorithm design. Hashing is the process of creating a short digest (i.e., 64 bits) for a message of arbitrary length, for exam- ple 20 Mbytes. Hashing algorithms were first used for sear- ching records in databases; they are central for digital si- gnature applications and are used for authentication without secrecy. Covering all practical and theoretical issues related to the design of secure hashing algorithms the book is self contained; it includes an extensive bibliography on the topic. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v756 606 $aData structures (Computer science) 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aCombinatorics 606 $aAlgorithms 606 $aOperating systems (Computers) 606 $aData Structures$3https://scigraph.springernature.com/ontologies/product-market-codes/I15017 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aCombinatorics$3https://scigraph.springernature.com/ontologies/product-market-codes/M29010 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 615 0$aData structures (Computer science). 615 0$aData encryption (Computer science). 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aCombinatorics. 615 0$aAlgorithms. 615 0$aOperating systems (Computers). 615 14$aData Structures. 615 24$aCryptology. 615 24$aCoding and Information Theory. 615 24$aCombinatorics. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aOperating Systems. 676 $a005.8/2 700 $aPieprzyk$b Josef$4aut$4http://id.loc.gov/vocabulary/relators/aut$0486892 702 $aSadeghiyan$b Babak$4aut$4http://id.loc.gov/vocabulary/relators/aut 906 $aBOOK 912 $a996466067303316 996 $aDesign of hashing algorithms$91492502 997 $aUNISA