Team:Davidson-Missouri Western/Applications of Hash Functions
From 2008.igem.org
- Prove authentication of document
- Protect Government Documents
- Minimize Cheating on Standardized Tests
- Protect Lengthy and Important Instructions
- Protect Financial Transactions
- Protect Passwords
- Detect tampered pictures (pictures that have been photo-shopped) Detect tampered pictures with hidden info (terrorists)