SANS Institute has published a readable general overview of hash functions. While the principles discussed are generally sound, keep in mind that many functions named in this article are now obsolete. HMAC, however, remains a popular technique for ensuring message integrity.
Bellare, Canetti, and Krawczyk published a classic paper on keyed hash functions and HMAC in 1996.
We detect alterations in messages using a cryptographic hash function with a shared secret key.
Video notes: cys.me/vid/c05.
Video #6 gives examples of weak crypto used in DVD technology vimeo.com/199858435
The previous video describes the SSL/TLS protocol vimeo.com/197456690
See the entire Cryptosmith series in its album vimeo.com/album/4229550