hash-function
function which maps strings of bits to fixed-length strings of bits, satisfying the following two properties: a) for a given output, it is computationally infeasible to find an input which maps to this output; and b) for a given output, it is computationally infeasible to find a second input which maps to the same outputNOTE: Computational feasibility depends on the specific security requirements and environment.
Application Area:
Automatic Vehicle and Equipment Identification (AVI/AEI)
Strukturální kategorie:
Fundamental Concepts and Foundations,
Verification and Security
