Back to Results
First PageMeta Content
Hash function / Cryptographic hash functions / Information retrieval / Artificial intelligence / Cyberwarfare / Cryptography / Hashing / Error detection and correction


COMPUTER SCIENCE TRIPOS Part IB – 2012 – Paper 4 9 Security I (MGK) (a) Name and briefly explain three increasingly demanding security properties expected from a secure hash function h.
Add to Reading List

Document Date: 2014-06-09 10:18:42


Open Document

File Size: 82,13 KB

Share Result on Facebook

Technology

encryption / secret key / /

SocialTag