Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,117,954 papers from all fields of science
Search
Sign In
Create Free Account
Cryptographic hash function
Known as:
Sphincter hash
, CHF
, Secure hash function
Expand
A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography. It is a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Anti-computer forensics
BEAR and LION ciphers
Bcrypt
Berman–Hartmanis conjecture
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
What Is the Blockchain?
M. D. Pierro
Computing in science & engineering (Print)
2017
Corpus ID: 9747761
Blockchain is a new technology, based on hashing, which is at the foundation of the platforms for trading cryptocurrencies and…
Expand
Highly Cited
2014
Highly Cited
2014
Privacy-Preserving Public Auditing For Secure Cloud Storage
Mr. Navanath Jadhav
,
Mrs. L.Laxmi
2014
Corpus ID: 9074320
By using Cloud storage, users can access applications, services, software whenever they requires over the internet. Users can put…
Expand
Highly Cited
2009
Highly Cited
2009
Cryptographic hash function Blue Midnight Wish
D. Gligoroski
,
Vlastimil Klíma
,
S. J. Knapskog
,
Mohamed El-Hadedy
,
J. Amundsen
Proceedings of the 1st International Workshop on…
2009
Corpus ID: 18776474
The cryptographic hash function Blue Midnight Wish was submitted as a candidate for SHA-3 hash competition organized by National…
Expand
2009
2009
Cryptographic hash function Edon-R′
D. Gligoroski
,
Rune Steinsmo Odegard
,
+5 authors
Mohamed El-Hadedy
Proceedings of the 1st International Workshop on…
2009
Corpus ID: 14362658
In this paper we describe in details the tweaked cryptographic hash function Edon-R that we denote as Edon-R′. Edon-R was…
Expand
Highly Cited
2008
Highly Cited
2008
Efficient Index-Based Audio Matching
F. Kurth
,
Meinard Müller
IEEE Transactions on Audio, Speech, and Language…
2008
Corpus ID: 206601781
Given a large audio database of music recordings, the goal of classical audio identification is to identify a particular audio…
Expand
2004
2004
Cryptographic Hash Functions
J. Buchmann
2004
Corpus ID: 53939069
In this chapter, we discuss cryptographic hash functions. They are used, for example, in digital signatures. Throughout this…
Expand
Highly Cited
2004
Highly Cited
2004
Personalised cryptographic key generation based on FaceHashing
A. Teoh
,
D. Ngo
,
A. Goh
Computers & security
2004
Corpus ID: 8286447
Highly Cited
1981
Highly Cited
1981
Investigation of physical parameters important for the solid state fermentation of straw by white rot fungi
F. Zadražil
,
H. Brunnert
European Journal of Applied Microbiology and…
1981
Corpus ID: 42177959
SummaryIn laboratory and semi-industrial scale experiments the influence of the substrate water content, temperature, and…
Expand
Highly Cited
1977
Highly Cited
1977
Above-ground dry matter, energy, and nutrient contents of trees in an age series of Pinus radiata plantations.
H. Madgwick
,
D. S. Jackson
,
P. J. Knight
1977
Corpus ID: 127727079
Eight sample stands ranging in age from 2 to 22 years were studied to characterise dry matter, energy, and nutrient contents of…
Expand
Highly Cited
1941
Highly Cited
1941
GASOMETRIC DETERMINATION OF CARBOXYL GROUPS IN FREE AMINO ACIDS
D. V. Slyke
,
R. T. Dillon
,
D. Macfadyen
,
P. Hamilton
1941
Corpus ID: 31104856
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required