HOME > Detail View

Detail View

Design of hashing algorithms

Design of hashing algorithms

Material type
단행본
Personal Author
Pieprzyk, Josef, 1949-. Sadeghiyan, Babak, 1961-.
Title Statement
Design of hashing algorithms / Josef Pieprzyk, Babak Sadeghiyan.
Publication, Distribution, etc
Berlin ;   New York :   Springer-Verlag,   c1993.  
Physical Medium
xiii, 194 p. : ill. ; 24 cm.
Series Statement
Lecture notes in computer science ;756
ISBN
3540575006 (Berlin : alk. paper) 9783540575009 (Berlin : alk. paper) 0387575006 (New York : alk. paper) 9780387575001 (New York : alk. paper)
Bibliography, Etc. Note
Includes bibliographical references (p. 179-190) and index.
Subject Added Entry-Topical Term
Hashing (Computer science) Computer algorithms. Computer security.
000 01425camuu2200385 a 4500
001 000045562177
005 20091127161207
008 931015s1993 gw a b 001 0 eng
010 ▼a 93041251
020 ▼a 3540575006 (Berlin : alk. paper)
020 ▼a 9783540575009 (Berlin : alk. paper)
020 ▼a 0387575006 (New York : alk. paper)
020 ▼a 9780387575001 (New York : alk. paper)
035 ▼a (OCoLC)ocm29256237
035 ▼a (OCoLC)29256237
035 ▼a (KERIS)REF000014715738
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
050 0 0 ▼a QA76.9.H36 ▼b P53 1993
082 0 0 ▼a 005.8/2 ▼2 20
082 0 4 ▼a 005.741 ▼2 22
090 ▼a 005.741 ▼b P614d
100 1 ▼a Pieprzyk, Josef, ▼d 1949-.
245 1 0 ▼a Design of hashing algorithms / ▼c Josef Pieprzyk, Babak Sadeghiyan.
260 ▼a Berlin ; ▼a New York : ▼b Springer-Verlag, ▼c c1993.
300 ▼a xiii, 194 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science ; ▼v 756
504 ▼a Includes bibliographical references (p. 179-190) and index.
650 0 ▼a Hashing (Computer science)
650 0 ▼a Computer algorithms.
650 0 ▼a Computer security.
700 1 ▼a Sadeghiyan, Babak, ▼d 1961-.
830 0 ▼a Lecture notes in computer science ; ▼v 756.
945 ▼a KINS

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.741 P614d Accession No. 121186949 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents

Overview of hash functions.- Methods of attack on hash functions.- Pseudorandomness.- Construction of super-pseudorandom permutations.- A sound structure.- A construction for one way hash functions and pseudorandom bit generators.- How to construct a family of strong one-way permutations.- Conclusions.


Information Provided By: : Aladin

New Arrivals Books in Related Fields