Practical Applications


 * Prove authentication of document


 * Protect Government Documents


 * Minimize Cheating on Standardized Tests


 * Protect Lengthy and Important Instructions


 * Protect Financial Transactions


 * Protect Passwords


 * Detect tampered pictures (pictures that have been photo-shopped) Detect tampered pictures with hidden info (terrorists)


 * Ideal Hash Function Characteristics Page


 * Home