digital signature

(redirected from Cryptographic hash function)
Also found in: Dictionary, Legal, Financial, Encyclopedia, Wikipedia.
Related to Cryptographic hash function: MD5

digital signature

An electronic signature based on cryptographic rules and parameters of originator authentication, which identify the signer and verify the integrity of the data pertaining to the signature.
Segen's Medical Dictionary. © 2012 Farlex, Inc. All rights reserved.

digital signature

In an electronic health record, a unique, personalized alphanumeric code (or set of codes) that identifies one and only one user of the system.
Medical Dictionary, © 2009 Farlex and Partners
References in periodicals archive ?
HMAC [19] is a well-studied and used method of turning cryptographic hash functions into MACs with a proof of security [20].
Cryptographic hash functions such as SHA512 are hash functions that must be able to withstand all known types of cryptanalytic attack and have very strong cryptographic requirements [3].
A keyed-Hash Message Authentication Code (HMAC or KHMAC), is a type of message authentication code (MAC) calculated using a specific algorithm involving a cryptographic hash function in combination with a secret key.
In recent years, the rapid advancement of cryptanalytic technologies[6] such as SHA-1 and MD5[7], capable of deciphering cryptographic hash functions, have increased the requirement for new types of hash functions that feature the properties to withstand this progress.
An HMAC is a type of message authentication code (MAC) calculated using a specific algorithm involving a cryptographic hash function in combination with a secret key.
The keyed-hash message authentication Code, abbreviated as HMAC, can work with any cryptographic hash function [31].
(3) It selects a cryptographic hash function H : [{0,1}.sup.l] [right arrow] [{0,1}.sup.k].
In other words, instead of storing a password by just hashing it, a salt value is concatenated to the password before hashing using a cryptographic hash function such as MD5, hence the name salted hash.
Then, all generated blocks are hashed using a cryptographic hash function (FNV) and the 6 least significant bits of each hash is encoded using a Base64 character.
The HMAC is computed with a cryptographic hash function, such as Whirlpool.
Keyed-Hash Message Authentication Code (HMAC) is standardized in FIPS 198-1, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, in combination with a shared secret key.

Full browser ?