Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,892,870 papers from all fields of science
Search
Sign In
Create Free Account
HAVAL
HAVAL is a cryptographic hash function. Unlike MD5, but like most modern cryptographic hash functions, HAVAL can produce hashes of different lengths…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Bent function
Comparison of cryptographic hash functions
Cryptographic hash function
Hash function security summary
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
HAVAL H7 全家福
白帆
2016
Corpus ID: 126215575
去掉"4"这个不吉利的数字,再去掉已经停产的"3"系车型,H7的到来让哈弗系列车型终于圆满了,从H1到H9,集齐了从小型SUV到中大型SUV共7款车型,这是召唤神龙的节奏啊!晗弗系列也终于可以拍一张全家福了!在哈弗H7到来之前,从H6到H8…
Expand
2015
2015
HAVAL H6 COUPE 哎呦,不错哦!
李文斌
,
白帆
2015
Corpus ID: 62447608
尽管事先已经做了充足的准备,但当我真正站在哈弗H6 Coupe的身边时还是不禁发出了感叹:怎么能这么漂亮呢?你很难想象我当时的心情,因为在不少人的印象中,哈弗依然是那个专心造粗犷SUV的厂商,但我们真的要转变一下旧思想了。
2014
2014
HAVAL H8 向上看齐
白帆
2014
Corpus ID: 195922894
不夸张地讲,在国内汽车市场,长城的哈弗系列车型是自主品牌SUV车型中最具标杆气质的车型。当哈弗H6还在以惊人的销量分流着那些合资品牌主流SUV的消费者的时候,哈弗H8的悄然来到又为那些更高级别的全尺寸SUV…
Expand
2011
2011
Improved Preimage Attack on 3-Pass HAVAL
钟锦敏
,
来学嘉
,
段明
2011
Corpus ID: 125063685
HAVAL is a hash function proposed by Zheng et al.in 1992,including 3-,4-and 5-pass versions.We improve pseudo-preimage and…
Expand
2011
2011
深藏不露 GWM HAVAL H5 AT
刘雅坤
,
冯欣(图)
2011
Corpus ID: 60889585
在中国SUV市场中,长城哈弗SUV虽然在名气上不敌日系或者德系的SUV产品,但是在销量上却始终遥遥领先,这与长城汽车一贯低调做事的态度不无关系。今天的主角是新增两大"利器"的哈弗H5欧风版,虽然它相貌平常,但是"内功"深厚。
2007
2007
An attack on hash function HAVAL-128
Xiaoyun Wang
,
D. Feng
,
Xiu-gui Yu
Science in China Series F: Information Sciences
2007
Corpus ID: 19308540
In this paper, we give a fast attack against hash function—HAVAL-128. HAVAL was presented by Y. L. Zheng et al. at Auscrypto’92…
Expand
2007
2007
A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms
G. Davida
,
J. Hansen
IACR Cryptology ePrint Archive
2007
Corpus ID: 18835250
Cryptographic hash algorithms are important building blocks in cryptographic protocols, providing authentication and assurance of…
Expand
2006
2006
Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers
T. Johansson
,
W. Meier
,
Frédéric Muller
Fast Software Encryption Workshop
2006
Corpus ID: 21307274
We present several attacks against the Achterbahn stream cipher, which was proposed to the eSTREAM competition. We can break the…
Expand
2006
2006
Combined Differential, Linear and Related-Key Attacks on Block Ciphers and MAC Algorithms
Jongsung Kim
IACR Cryptology ePrint Archive
2006
Corpus ID: 27803827
Differential and linear attacks are the most widely used cryptanalytic tools to evaluate the security of symmetric-key…
Expand
1993
1993
HAVAL - A one-way hashing algorithm with variable length of output
Yuliang Zheng
Annual International Cryptology Conference
1993
Corpus ID: 267876479
A one-way hashing algorithm is a deterministic algorithm that compresses an arbitrary long message into a value of speciied…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE