Skip to search formSkip to main contentSkip to account menu

Cryptographic hash function

Known as: Sphincter hash, CHF, Secure hash function 
A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography. It is a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
  • M. D. Pierro
  • 2017
  • Corpus ID: 9747761
Blockchain is a new technology, based on hashing, which is at the foundation of the platforms for trading cryptocurrencies and… 
Highly Cited
2014
Highly Cited
2014
By using Cloud storage, users can access applications, services, software whenever they requires over the internet. Users can put… 
Highly Cited
2010
Highly Cited
2010
Recently, Yoon et al. and Wang et al. independently proposed a dynamic ID authentication scheme and claimed that their schemes… 
Highly Cited
2008
Highly Cited
2008
Given a large audio database of music recordings, the goal of classical audio identification is to identify a particular audio… 
2004
2004
In this chapter, we discuss cryptographic hash functions. They are used, for example, in digital signatures. Throughout this… 
Highly Cited
1987
Highly Cited
1987
The near IR and visible vibrational absorption spectra of CHF3 were recorded up to wave numbers of 17 500 cm−1 providing complete… 
Highly Cited
1981
Highly Cited
1981
SummaryIn laboratory and semi-industrial scale experiments the influence of the substrate water content, temperature, and… 
Highly Cited
1977
Highly Cited
1977
Eight sample stands ranging in age from 2 to 22 years were studied to characterise dry matter, energy, and nutrient contents of… 
Highly Cited
1976
Highly Cited
1976
ALTHOUGH many species of fish ingest large amounts of detritus, its nutritional value has been questioned frequently1,2. Detritus…