Cryptographic hash functions are a useful building block for several cryptographic applications. The most important are certainly the protection of information authentication and digital signatures. This overview paper will discuss the definitions, describe some attacks on hash functions, and will give an overview of the existing practical constructions.
Crpto Analysis, Compression Function