For the first time, this book discloses our theoretical reasoning and practice details on hash function cryptanalysis as well as their implication in information security, mainly based on the... This description may be from another edition of this product.