Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,220,491 papers from all fields of science
Search
Sign In
Create Free Account
FORK-256
FORK-256 is a hash algorithm designed in response to security issues discovered in the earlier SHA-1 and MD5 algorithms. After substantial…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Botan
Collision attack
Computational complexity theory
Cryptanalysis
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Building a 256-bit hash function on a stronger MD variant
Harshvardhan Tiwari
,
Krishna Asawa
Central European Journal of Computer Science
2014
Corpus ID: 489404
Cryptographic hash functions are important cryptographic techniques and are used widely in many cryptographic applications and…
Expand
2012
2012
Crypto-Precision: Testing Tool for Hash Function
Harshvardhan Tiwari
,
Ankit Luthra
,
Himanshu Goel
,
Sambhav Sharma
,
Krishna Asawa
International Conference on Application and…
2012
Corpus ID: 11121957
In this paper, we present a new generic cryptographic hash function testing tool called Crypto-Precision. It is designed to be…
Expand
2009
2009
NESHA-256, NEw 256-bit Secure Hash Algorithm (Extended Abstract)
Y. E. Salehani
,
Amir Tabatabaei
,
M. Abyaneh
,
M. Hassanzadeh
IACR Cryptology ePrint Archive
2009
Corpus ID: 2381183
In this paper, we introduce a new dedicated 256-bit hash function: NESHA-256. The recently contest for hash functions held by…
Expand
2008
2008
Evaluation on Recent Committed Crypt Analysis Hash Function
A. Arul Lawrence Selvakumar
,
C. S. Ganandhas
2008
Corpus ID: 6679130
— This paper describes the study of cryptographic hash functions, one of the most important classes of primitives used in recent…
Expand
2008
2008
Currently Committed Crypt Analysis Hash Function
A. Arul Lawrence Selvakumar
,
C. S. Ganandhas
2008
Corpus ID: 752125
This paper describes the study of cryptographic hash functions, one of the most important classes of primitives used in recent…
Expand
2007
2007
New FORK-256
Deukjo Hong
,
D. Chang
,
+5 authors
Sungtaek Chee
IACR Cryptology ePrint Archive
2007
Corpus ID: 5801653
The hash function FORK-256 was published at the first NIST hash workshop and FSE 2006. It consists of simple operations so that…
Expand
2007
2007
A Meet-in-the-Middle Collision Attack Against the New FORK-256
Markku-Juhani O. Saarinen
IACR Cryptology ePrint Archive
2007
Corpus ID: 14898923
We show that a 2112.9 collision attack exists against the FORK-256 Hash Function. The attack is surprisingly simple compared to…
Expand
2007
2007
FORK-160: A New 160 - bit Software-Oriented Hash Function
Amir Hossein Tabatabaee
,
Yaser Esmaeili
,
M. Abyaneh
,
H. Ahmadi
2007
Corpus ID: 2371372
††† Summary There are various cryptographic protocols in which 160-bit message digest is required. SHA-1is the most well-known…
Expand
2006
2006
A New Dedicated 256-Bit Hash Function: FORK-256
Deukjo Hong
,
D. Chang
,
+5 authors
Sungtaek Chee
Fast Software Encryption Workshop
2006
Corpus ID: 12787674
This paper describes a new software-efficient 256-bit hash function, FORK-256. Recently proposed attacks on MD5 and SHA-1…
Expand
2006
2006
Collisions for two branches of FORK-256
K. Matusiewicz
,
S. Contini
,
J. Pieprzyk
2006
Corpus ID: 15100991
Disclosed is a process for recovering phenols from phenol-containing streams having at least a sufficient amount of water. The…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE