Next Previous Table of Contents

References

Chapter 18 of Schneier discusses a possibly existent set of hash functions useful for cryptography known as one-way hash functions. The SHA-1 algorithm is believed to be such a function, and is described in 18.7.
  1. Schneier, Bruce, Applied Cryptography. Second Edition: Protocols, Algoritms, and Source Code in C, John Wiley and Sons, Inc., 1996

Next Previous Table of Contents