Next
Previous
Table of Contents
References
Chapter 18 of Schneier discusses a possibly existent set of
hash functions useful for cryptography known as one-way
hash functions. The SHA-1 algorithm is believed to be such a function,
and is described in 18.7.
- Schneier, Bruce, Applied Cryptography. Second Edition: Protocols, Algoritms, and Source Code in C, John Wiley and Sons, Inc., 1996
Next
Previous
Table of Contents