Kochar, Komal; Sanadhya, Somitra Kumar (Advisor)
(2012-07-25)
Cryptographic hash Functions are widely used for a wide range of applications such as au-
thentication of information, digital signatures and protection of pass-phrases. In the last
few years, the cryptanalysis of hash ...