Skip to search formSkip to main contentSkip to account menu

Cryptographic hash function

Known as: Sphincter hash, CHF, Secure hash function 
A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography. It is a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
  • M. D. Pierro
  • 2017
  • Corpus ID: 9747761
Blockchain is a new technology, based on hashing, which is at the foundation of the platforms for trading cryptocurrencies and… 
Highly Cited
2014
Highly Cited
2014
By using Cloud storage, users can access applications, services, software whenever they requires over the internet. Users can put… 
Highly Cited
2009
Highly Cited
2009
The cryptographic hash function Blue Midnight Wish was submitted as a candidate for SHA-3 hash competition organized by National… 
2009
2009
In this paper we describe in details the tweaked cryptographic hash function Edon-R that we denote as Edon-R′. Edon-R was… 
Highly Cited
2008
Highly Cited
2008
Given a large audio database of music recordings, the goal of classical audio identification is to identify a particular audio… 
2004
2004
In this chapter, we discuss cryptographic hash functions. They are used, for example, in digital signatures. Throughout this… 
Highly Cited
1981
Highly Cited
1981
SummaryIn laboratory and semi-industrial scale experiments the influence of the substrate water content, temperature, and… 
Highly Cited
1977
Highly Cited
1977
Eight sample stands ranging in age from 2 to 22 years were studied to characterise dry matter, energy, and nutrient contents of…