[PDF][PDF] Adoption and Analysis of Security Applications to Secure Data Integrity
In cryptographic applications, hashing techniques are used for data integrity checking,
authentication and, where digital signatures are involved, to detect modifications during …
authentication and, where digital signatures are involved, to detect modifications during …