Hash chain

Known as: Hash 
A hash chain is the successive application of a cryptographic hash function to a piece of data. In computer security, a hash chain is a method to… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
We present explicit optimal binary pebbling algorithms for reversing one-way hash chains. For a hash chain of length 2, the… (More)
Is this relevant?
2010
2010
The prospection of video streaming security has been changed considerably during the last years. With the new generation of hand… (More)
  • figure 1
  • figure 3
  • table 1
  • figure 2
  • figure 5
Is this relevant?
2009
2009
With the development of Electronic commerce, more and more transactions on information goods or services have been or will be… (More)
  • figure 1
  • figure 2
  • figure 4
Is this relevant?
2009
2009
We study the problem of traversing a hash chain with dynamic helper points (called pebbles). Basically, two kinds of algorithms… (More)
Is this relevant?
2008
2008
In this paper, we propose two RFID identification and authentication schemes based on the previously proposed triggered hash… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2008
2008
Hash chains are widely used for entity authentication or data-origin authentication. However, finite length of a hash chain… (More)
  • table 1
  • figure 2
  • figure 1
Is this relevant?
2007
2007
  • Dong-hun Lee
  • 3rd IEEE Workshop on Secure Network Protocols
  • 2007
A hash chain is constructed by repeated hashing from an initial value. While it finds applications for network protocol design it… (More)
  • figure I
  • table 1
Is this relevant?
Highly Cited
2005
Highly Cited
2005
One-way chains are an important cryptographic primitive in many security applications. As one-way chains are very efficient to… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2004
2004
Hash Chains are used extensively in various cryptographic systems such as onetime passwords, server supported signatures, secure… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Radio frequency identification (RFID) is expected to become an important and ubiquitous infrastructure technology. As RFID tags… (More)
  • figure 1
  • figure 2
Is this relevant?