Yevseiev, Serhii; Havrylova, Alla; Korol, Olha; … - 2022
The transfer of information by telecommunication channels is accompanied by message hashing to control the integrity of the data and confirm the authenticity of the data. When using a reliable hash function, it is computationally difficult to create a fake message with a pre-existing hash code,...