Code360 powered by Coding Ninjas X Naukri.com. Code360 powered by Coding Ninjas X Naukri.com
Last updated: Nov 28, 2022

Hash Functions

As we have learned that hash functions can be helpful in storing the data in c, and c++ and they use a key. Here, also we will talk about hash functions and how these hash functions help to store data secretly.
Hash Functions and Data Integrity in Cryptography EASY
This article will discuss hash functions in cryptography and its application as data integrity with various methods to achieve authenticity.
Security of Hash Functions in Cryptography
This article will discuss how the security of hash functions in cryptography is achieved in detail.
Comparison of Security Criteria in Hash
In this article, we will discuss the Comparison of Security Criteria in Hash and basic concepts of Cryptography.
Iterated Hash Functions
This article will discuss what iterated hash functions are and the steps to create an iterated hash function and its application.
The Merkle-Damgard Construction in Hash functions MEDIUM
This article discusses the Merkle-Damgard Construction in Hash Function.
Author kaido
0 upvotes
The Sponge Construction in Hash Functions
This blog will discuss the sponge construction in hash functions and about SHA-3, its design and security levels
Message Authentication Codes in Cryptography
This article incorporates the Message Authentication Codes in Cryptography.
Nested MACs and HMAC in Cryptography
This article incorporates the Cipher Block Chaining Message Authentication Codes in Cryptography.
CBC-MAC in Cryptography MEDIUM
 This article incorporates the Cipher Block Chaining Message Authentication Codes in Cryptography.
Authenticated Encryption in Cryptography
In this article, we will discuss everything about Authenticated Encryption in Cryptography.
Unconditionally Secure MACs in Cryptography
This article will discuss the Unconditionally secure Macs in Cryptography, their working, and limitations.