[
next
] [
prev
] [
prev-tail
] [
tail
] [
up
]
Part V
Authentication
16
Hash Functions and MACs
16.1
Informal Overview of Hashes and MACs
16.2
Introduction to Hash Functions
16.3
Properties of Cryptographic Hash Functions
16.4
Introduction to Message Authentication Codes
17
Authentication and Data Integrity
17.1
Aims of Authentication
17.2
Authentication with Symmetric Key Encryption
17.3
Authentication with Hash Functions
17.4
Authentication with MACs
17.5
Digital Signatures
[
next
] [
prev
] [
prev-tail
] [
front
] [
up
]