Hash function security summary

Known as: Hash security, Hash function security overview, Hash function security 
This article summarizes publicly known attacks against cryptographic hash functions. Note that not all entries may be up to date. For a summary of… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2005-2014
02420052014

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
The design principles proposed independently by both Ralph Merkle and Ivan Damgård in 1989 are applied widely in hash functions… (More)
Is this relevant?
2013
2013
We present a security ontology to help non-security expert software designers or developers to: (1) design secure software and… (More)
  • figure 1
Is this relevant?
2012
2012
In recent years, the amount of electronic communication has grown enormously. This has posed some new problems in information… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
2012
2012
In 2007, the US National Institute for Standards and Technology announced a call for the design of a new cryptographic hash… (More)
  • table 1
  • figure 1
  • table 2
Is this relevant?
2010
2010
We provide a concrete security treatment of several “provably secure” hash functions. Interpreting arguments behind MQ-HASH, FSB… (More)
Is this relevant?
2010
2010
In 2007, the US National Institute for Standards and Technology announced a call for the design of a new cryptographic hash… (More)
  • figure 1
  • figure 2
Is this relevant?
2009
2009
We provide two necessary conditions on hash functions for the Schnorr signature scheme to be secure, assuming compact group… (More)
Is this relevant?
2007
2007
We propose an Interactive Message Authentication Protocol (IMAP) using two channels; an insecure broadband channel and an… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
  • D. Lee
  • 2007 3rd IEEE Workshop on Secure Network…
  • 2007
A hash chain is constructed by repeated hashing from an initial value. While it finds applications for network protocol design it… (More)
  • figure I
  • table 1
Is this relevant?
2005
2005
Security is a very important issue, which has attracted the interest of the research community the latest years, at a great… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?