Cryptographic hash function

Known as: Sphincter hash, CHF, Secure hash function 
A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography. It is a… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2009
2009
In this paper we describe in details the tweaked cryptographic hash function Edon-R that we denote as Edon-R′. Edon-R was… (More)
  • table 1
  • table 2
  • table 4
  • table 5
  • table 6
Is this relevant?
2009
2009
The cryptographic hash function Blue Midnight Wish was submitted as a candidate for SHA-3 hash competition organized by National… (More)
Is this relevant?
2005
2005
This paper presents a new hash function design, which is different from the popular designs of the MD4-family. Seen in the light… (More)
  • table 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We consider basic notions of security for cryptographic hash functions: collision resistance, preimage resistance, and second… (More)
  • figure 1
  • figure 3
Is this relevant?
Highly Cited
1997
Highly Cited
1997
This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind… (More)
Is this relevant?
Highly Cited
1996
Highly Cited
1996
The use of cryptographic hash functions like MD5 or SHA for message authentication has become a standard approach in many… (More)
Is this relevant?
Review
1994
Review
1994
Hash functions were introduced in cryptology in the late seventies as a tool to protect the authenticity of information. Soon it… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1989
Highly Cited
1989
We define a Universal One-Way Hash Function family, a new primitive which enables the compression of elements in the function… (More)
Is this relevant?
Highly Cited
1989
Highly Cited
1989
One way hash functions are a major tool in cryptography. DES is the best known and most widely used encryption function in the… (More)
Is this relevant?
Highly Cited
1970
Highly Cited
1970
In this paper trade-offs among certain computational factors in hash coding are analyzed. The paradigm problem considered is that… (More)
  • table I
Is this relevant?