Hash Functions Prev: Public-key encryption Next: Message authentication Prev: Public-key encryption Next: Message authentication