Introduction to the hash function as a personal data pseudonymisation technique
Author: AEPD
*Wait a few seconds for the document to load, the time may vary depending on your internet connection. If you prefer, you can download the file by clicking on the link below.
DownloadThis may interest you
Design and analysis of cryptographic algorithms
Kolbl, Stefan
Implementation of cryptographic algorithms and protocols
Omkar Guru, Sanjay Majumdar and Krithika K
Cryptographic hash functions - an overview
Bart Preneel
Cryptographic Algorithms and Protocols
Mohammad Khalid Imam Rahmani
Cryptographic Hash Functions
Kelvin W. Macharia