digital signature

Also found in: Medical, Legal, Financial, Encyclopedia, Wikipedia.
(redirected from Cryptographic hash function)

digital signature

n.
A digital file attached to an email or other electronic document that uses encryption and decryption algorithms to verify the document's origin and contents.
American Heritage® Dictionary of the English Language, Fifth Edition. Copyright © 2016 by Houghton Mifflin Harcourt Publishing Company. Published by Houghton Mifflin Harcourt Publishing Company. All rights reserved.

digital signature

n
(Computer Science) computing electronic proof of a person's identity involving the use of encryption; used to authenticate documents
Collins English Dictionary – Complete and Unabridged, 12th Edition 2014 © HarperCollins Publishers 1991, 1994, 1998, 2000, 2003, 2006, 2007, 2009, 2011, 2014
Mentioned in
References in periodicals archive
The proposed pseudo random bit generator uses Rubik's cube, chaotic map and cryptographic hash function for bit generation.
Third, blocks are linked in chronological order using a cryptographic hash function that securely connects each block to previous and subsequent blocks.
These systems use a cryptographic hash function. The security of these digital signature systems is based on the collision resistance of the hash functions that they use [3,4].
The ZRTP KDF was a cryptographic hash function that creates a key of length "length of key'.
SHA-256 is a one-way cryptographic hash function, which when used in conjunction with other cryptographic algorithms, such as a digital signature algorithm, enables a number of crucial network security services or operations.
Among the topics discussed are: automatic intrusion detection and secret multi agent preservation using authentication measurement network threat; a high level view of cryptographic hash function; a crime profiling system based on self-organizing map; biometric security; data hiding schemes based on singular value decomposition; a Malay language text-based anti-spam system using a neural network; the impact of big data on security; trust determination in wireless ad hoc networks; security impacts on social media platforms; and security in digital images.
The process, called "mining" in the Bitcoin vernacular, involves repeatedly running a computationally intensive mathematical function (called a cryptographic hash function) on a set of randomly seeded inputs until a specific pattern pops up.
(vii) Calculate the hash value of [m.sub.i] by using a cryptographic hash function h (e.g., SHA) and store h([m.sub.i]).
where HMAC_SHA3 is a cryptographic hash function and function 'First' truncates a message to the first 64 bits.
A cryptographic hash function must satisfy additional properties in order to be able to withstand all known types of cryptanalytic attack: 1) Preimage resistance: given a hash value it should be computationally difficult to find any message that has a given hash value.
Copyright © 2003-2025 Farlex, Inc Disclaimer
All content on this website, including dictionary, thesaurus, literature, geography, and other reference data is for informational purposes only. This information should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional.