Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

Cryptographic hash function

Known as: Sphincter hash, CHF, Secure hash function 
A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography. It is a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
This Standard specifies the Secure Hash Algorithm-3 (SHA-3) family of functions on binary data. Each of the SHA-3 functions is… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
Highly Cited
2015
Highly Cited
2015
This book includes the following chapters : Introduction; Mathematics of Cryptography; Traditional Symmetric-Key Ciphers… Expand
Highly Cited
2009
Highly Cited
2009
Executive Summary Skein is a new family of cryptographic hash functions. Its design combines speed, security, simplicity , and a… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Review
2007
Review
2007
Preface I. Introduction and Classical Cryptography Introduction Cryptography and Modern Cryptography The Setting of Private-Key… Expand
Highly Cited
2005
Highly Cited
2005
MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Highly Cited
2004
Highly Cited
2004
We consider basic notions of security for cryptographic hash functions: collision resistance, preimage resistance, and second… Expand
  • figure 1
  • figure 3
Highly Cited
1997
Highly Cited
1997
This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with… Expand
Highly Cited
1996
Highly Cited
1996
The use of cryptographic hash functions like MD5 or SHA-1 for message authentication has become a standard approach in many… Expand
  • figure 1
  • figure 2
  • figure 3
Highly Cited
1989
Highly Cited
1989
We define a Universal One-Way Hash Function family, a new primitive which enables the compression of elements in the function… Expand
Highly Cited
1989
Highly Cited
1989
One way hash functions are a major tool in cryptography. DES is the best known and most widely used encryption function in the… Expand