An Overview of Cryptographic Hash Functions and Their Uses

This paper provides a discussion of how the two related fields of encryption and hash functions are complementary, not replacement technologies for one another.
By
John Silva
February 6, 2003

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg