Friday 26th of April 2024
 

Cryptographic Hash functions - a review


Rajeev Sobti and G.Geetha

Cryptographic Hash functions are used to achieve a number of security objectives. In this paper, we bring out the importance of hash functions, its various structures, design techniques, attacks and the progressive recent development in this field.

Keywords: Cryptography, Hash function, compression function

Download Full-Text


ABOUT THE AUTHORS

Rajeev Sobti
Rajeev Sobti is heading School of Computer Science, Lovely Professional University, India. He has over 13 years of experience in industry, teaching and research. His research interest includes Cryptography and Computer System Architecture. He is also member, Consultant Board and Manuscript reviewer for Books on Discrete Mathematics, Operating System from Pearson Education (Singapore) PTE LTD.

G.Geetha
Prof.G.Geetha is heading School of Computer Science and Applications, Lovely Professional University, India. She has nearly two decades of experience in industry, teaching and research. Her research interest includes Cryptography, Information security and Image Processing. She has published more than 50 research papers in refereed Journals and Conferences. She serves as Editorial Board member and reviewer in various Journals and Conferences. She is presently the President of Advanced Computing Research Society. She is an active member of various professional organizations like ISCA, ISTE, CRSI etc.


IJCSI Published Papers Indexed By:

 

 

 

 
+++
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »