Skip to search formSkip to main contentSkip to account menu

FORK-256

FORK-256 is a hash algorithm designed in response to security issues discovered in the earlier SHA-1 and MD5 algorithms. After substantial… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Cryptographic hash functions are important cryptographic techniques and are used widely in many cryptographic applications and… 
2012
2012
In this paper, we present a new generic cryptographic hash function testing tool called Crypto-Precision. It is designed to be… 
2009
2009
In this paper, we introduce a new dedicated 256-bit hash function: NESHA-256. The recently contest for hash functions held by… 
2008
2008
— This paper describes the study of cryptographic hash functions, one of the most important classes of primitives used in recent… 
2008
2008
This paper describes the study of cryptographic hash functions, one of the most important classes of primitives used in recent… 
2007
2007
The hash function FORK-256 was published at the first NIST hash workshop and FSE 2006. It consists of simple operations so that… 
2007
2007
We show that a 2112.9 collision attack exists against the FORK-256 Hash Function. The attack is surprisingly simple compared to… 
2007
2007
††† Summary There are various cryptographic protocols in which 160-bit message digest is required. SHA-1is the most well-known… 
2006
2006
This paper describes a new software-efficient 256-bit hash function, FORK-256. Recently proposed attacks on MD5 and SHA-1… 
2006
2006
Disclosed is a process for recovering phenols from phenol-containing streams having at least a sufficient amount of water. The…