Browsing Electrical & Computer Engineering by Subject "authorization"
Now showing items 1-1 of 1
-
Analyses, Mitigation and Applications of Secure Hash Algorithms
(North Dakota State University, 2020)Cryptographic hash functions are one of the widely used cryptographic primitives with a purpose to ensure the integrity of the system or data. Hash functions are also utilized in conjunction with digital signatures to ...