Hash functions : Theory , attacks , and applications

  title={Hash functions : Theory , attacks , and applications},
  author={Ilya Mironov},
Hash functions, most notably MD5 and SHA-1, initially crafted for use in a handful of cryptographic schemes with specific security requirements, have become standard fare for many developers and protocol designers who treat them as black boxes with magic properties. This strategy had paid off until 2004—both functions appeared to have withstood the test of time and intense scrutiny of cryptanalysts. Starting last year, we have seen an explosion in the number and power of attacks on the standard… CONTINUE READING
Highly Cited
This paper has 67 citations. REVIEW CITATIONS
41 Citations
21 References
Similar Papers


Publications citing this paper.
Showing 1-10 of 41 extracted citations

67 Citations

Citations per Year
Semantic Scholar estimates that this publication has 67 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 21 references

Attacking hash functions by poisoned messages,

  • Magnus Daum, Stefan Lucks
  • EUROCRYPT rump session,
  • 2005

and R

  • P. Leach, M. Mealling
  • Salz, “A Universally Unique IDentifier (UUID) URN…
  • 2005
1 Excerpt

and D

  • R. Houseley, W. Polk, W. Ford
  • Solo, “Internet X.509 Public Key Infrastructure…
  • 2002

and Tom Shrimpton

  • John Black, Phillip Rogaway
  • “Black-box analysis of the block-cipher-based…
  • 2002
1 Excerpt

Black - box analysis of the blockcipherbased hashfunctions constructions from PGV

  • Thomas H. Cormen, Charles E. Leiserson
  • 2001

Second Edition

  • Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, Introduction to Algorithms
  • MIT Press,
  • 2001
1 Excerpt


  • Arjen K. Lenstra, R Eric
  • “Selecting cryptographic key sizes,” Journal of…
  • 2001
1 Excerpt

Similar Papers

Loading similar papers…