Toggle navigation
PDFSEARCH.IO
Document Search Engine - browse more than 18 million documents
Sign up
Sign in
Back to Results
First Page
Meta Content
View Document Preview and Link
COMPUTER SCIENCE TRIPOS Part IB – 2012 – Paper 4 9 Security I (MGK) (a) Name and briefly explain three increasingly demanding security properties expected from a secure hash function h.
Add to Reading List
Document Date: 2014-06-09 10:18:42
Open Document
File Size: 82,13 KB
Share Result on Facebook
Technology
encryption /
secret key /
/
SocialTag
Hash function
Cryptographic hash functions
Information retrieval
Artificial intelligence
Cyberwarfare
Cryptography
Hashing
Error detection and correction