{"title":"用于信息认证的哈希函数","authors":"B. Preneel, R. Govaerts, J. Vandewalle","doi":"10.1109/CMPEUR.1992.218437","DOIUrl":null,"url":null,"abstract":"The protection of information authentication based on cryptographically secure hash functions is discussed. Two classes of hash functions are defined, namely keyed and keyless hash functions. It is shown that they can be applied under different circumstances to protect the authenticity of information. A taxonomy of existing schemes for information authentication is developed, and an overview of practical schemes is given.<<ETX>>","PeriodicalId":390273,"journal":{"name":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Hash functions for information authentication\",\"authors\":\"B. Preneel, R. Govaerts, J. Vandewalle\",\"doi\":\"10.1109/CMPEUR.1992.218437\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The protection of information authentication based on cryptographically secure hash functions is discussed. Two classes of hash functions are defined, namely keyed and keyless hash functions. It is shown that they can be applied under different circumstances to protect the authenticity of information. A taxonomy of existing schemes for information authentication is developed, and an overview of practical schemes is given.<<ETX>>\",\"PeriodicalId\":390273,\"journal\":{\"name\":\"CompEuro 1992 Proceedings Computer Systems and Software Engineering\",\"volume\":\"57 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1992-05-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"CompEuro 1992 Proceedings Computer Systems and Software Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CMPEUR.1992.218437\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CMPEUR.1992.218437","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The protection of information authentication based on cryptographically secure hash functions is discussed. Two classes of hash functions are defined, namely keyed and keyless hash functions. It is shown that they can be applied under different circumstances to protect the authenticity of information. A taxonomy of existing schemes for information authentication is developed, and an overview of practical schemes is given.<>