Talk With an Expert

An Overview of Cryptographic Hash Functions and Their Uses

An Overview of Cryptographic Hash Functions and Their Uses (PDF, 1.90MB)Published: 06 Feb, 2003
Created by
John Silva

This paper provides a discussion of how the two related fields of encryption and hash functions are complementary, not replacement technologies for one another.