Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,209,468 papers from all fields of science
Search
Sign In
Create Free Account
HAS-160
HAS-160 is a cryptographic hash function designed for use with the Korean KCDSA digital signature algorithm. It is derived from SHA-1, with assorted…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Cryptographic hash function
Digital signature
KCDSA
List of hash functions
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Improved Preimage Attacks on RIPEMD-160 and HAS-160
Yanzhao Shen
,
Gaoli Wang
KSII Transactions on Internet and Information…
2018
Corpus ID: 7078232
The hash function RIPEMD-160 is a worldwide ISO/IEC standard and the hash function HAS-160 is the Korean hash standard and is…
Expand
Review
2015
Review
2015
An Analysis of Agility of the Cryptography API Next Generation in Microsoft: Based on Implementation Example of Applying Cryptography Algorithm HAS-160 in South Korea
Kyungroul Lee
,
Ilsun You
,
Kangbin Yim
Conference on Information Security and Cryptology
2015
Corpus ID: 267888621
This paper surveys structures, features and programming techniques of CNG that is substitution of CAPI in Microsoft, and…
Expand
2014
2014
(Pseudo-) Preimage Attacks on Step-Reduced HAS-160 and RIPEMD-160
Gaoli Wang
,
Yanzhao Shen
Information Security Conference
2014
Corpus ID: 32190252
The hash function HAS-160 is standardized by the Korean government and widely used in Korea, and the hash function RIPEMD-160 is…
Expand
2014
2014
Improved Preimage Attacks against Reduced HAS-160
R. Hao
,
Bao Li
,
Bingke Ma
,
Xiaoqian Li
Information Security Practice and Experience
2014
Corpus ID: 11731640
HAS-160 is a Korean industry standard for hash functions. It has a similar structure to SHA-1 and produces a 160-bit hash value…
Expand
2012
2012
A Study on Area-Efficient Design of Unified MD5 and HAS-160 Hash Algorithms
S. Sonh
2012
Corpus ID: 62753082
This paper deals with hardware design which unifies MD5 and HAS-160 hash algorithms. Two algorithms get a message with arbitrary…
Expand
2010
2010
Preimage Attacks on Reduced Steps of ARIRANG, HAS-160, and PKC98-Hash
Deukjo Hong
,
Bonwook Koo
,
Woo-Hwan Kim
,
Daesung Kwon
Conference on Information Security and Cryptology
2010
Corpus ID: 59001372
In this paper, we present the preimage attacks on step-reduced ARIRANG, HAS-160, and PKC98-Hash. We applied Aoki and Sasaki's…
Expand
2010
2010
ARIRANG, HAS-160, PKC98-Hash의 축소된 단계들에 대한 역상공격
홍득조
,
구본욱
,
김우환
,
권대성
2010
Corpus ID: 60941235
본 논문에서는 ARIRANG, HAS-160, PKC98-Hash의 단계-축소 버전에 대한 역상공격 결과를 소개한다. 이 공격에는 Aoki와 Sasaki가 SHA-0와 SHA-1의 단계-축소 버전을 공격하는데 이용한 chunk…
Expand
2009
2009
Related-Key Rectangle Attack of the Full 80-Round HAS-160 Encryption Mode
E. Fleischmann
,
M. Gorski
,
S. Lucks
IACR Cryptology ePrint Archive
2009
Corpus ID: 18252649
In this paper we investigate the security of the encryption mode of the HAS-160 hash function. HAS-160 is a Korean hash standard…
Expand
2005
2005
Hardware Design of Standard Hash Algorithm HAS-160
Choong-Mo Youn
,
Beom-Geun Lee
J. Inform. and Commun. Convergence Engineering
2005
Corpus ID: 35084526
This paper is about the hardware implementation of the Hash algorithm, HAS-160, which is widely used for Internet security and…
Expand
2002
2002
Design of Hash Processor for SHA-1, HAS-160, and Pseudo-Random Number Generator
Shin-Woo Jeon
,
N. Kim
,
Y. Jeong
2002
Corpus ID: 60374670
In this paper, we present a design of a hash processor for data security systems. Two standard hash algorithms, Sha-1(American…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE