Code360 powered by Coding Ninjas X Naukri.com. Code360 powered by Coding Ninjas X Naukri.com
Last updated: Nov 28, 2022

Hash Functions

As we have learned that hash functions can be helpful in storing the data in c, and c++ and they use a key. Here, also we will talk about hash functions and how these hash functions help to store data secretly.
Hash Functions and Data Integrity in Cryptography EASY
This article will discuss hash functions in cryptography and its application as data integrity with various methods to achieve authenticity.
Security of Hash Functions in Cryptography
This article will discuss how the security of hash functions in cryptography is achieved in detail.
The Random Oracle Model and its Algorithms in Cryptography
In this blog, we will be looking at random oracle modes in cryptography.
Neo4j Query Cypher Language
Cypher Language is a query language introduced by Neo4j where It deals with the nodes, and the data is present in the graph format. ASCII-Art is used to create patterns in cypher language.
Comparison of Security Criteria in Hash
In this article, we will discuss the Comparison of Security Criteria in Hash and basic concepts of Cryptography.
Iterated Hash Functions
This article will discuss what iterated hash functions are and the steps to create an iterated hash function and its application.
The Merkle-Damgard Construction in Hash functions MEDIUM
This article discusses the Merkle-Damgard Construction in Hash Function.
Author kaido
0 upvotes
The Sponge Construction in Hash Functions
This blog will discuss the sponge construction in hash functions and about SHA-3, its design and security levels
Message Authentication Codes in Cryptography
This article incorporates the Message Authentication Codes in Cryptography.
Nested MACs and HMAC in Cryptography
This article incorporates the Cipher Block Chaining Message Authentication Codes in Cryptography.
CBC-MAC in Cryptography MEDIUM
 This article incorporates the Cipher Block Chaining Message Authentication Codes in Cryptography.
Authenticated Encryption in Cryptography
In this article, we will discuss everything about Authenticated Encryption in Cryptography.
Unconditionally Secure MACs in Cryptography
This article will discuss the Unconditionally secure Macs in Cryptography, their working, and limitations.
Optimality of Deception Probabilities in Cryptography
This article discusses the Optimality of Deception Probabilities in Cryptography. It also discusses some faqs based on the same.
Author Alisha
0 upvotes
Strongly Universal Hash Families in Cryptography MEDIUM
Various theorems of one of the foundational concepts of Unconditionally Secure MACs- Strongly Universal Hash Families in Cryptography.