{"title":"Hash functions for information authentication","authors":"B. Preneel, R. Govaerts, J. Vandewalle","doi":"10.1109/CMPEUR.1992.218437","DOIUrl":null,"url":null,"abstract":"The protection of information authentication based on cryptographically secure hash functions is discussed. Two classes of hash functions are defined, namely keyed and keyless hash functions. It is shown that they can be applied under different circumstances to protect the authenticity of information. A taxonomy of existing schemes for information authentication is developed, and an overview of practical schemes is given.<<ETX>>","PeriodicalId":390273,"journal":{"name":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CMPEUR.1992.218437","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
The protection of information authentication based on cryptographically secure hash functions is discussed. Two classes of hash functions are defined, namely keyed and keyless hash functions. It is shown that they can be applied under different circumstances to protect the authenticity of information. A taxonomy of existing schemes for information authentication is developed, and an overview of practical schemes is given.<>