Skip to search formSkip to main contentSkip to account menu

Hash function security summary

Known as: Hash security, Hash function security overview, Hash function security 
This article summarizes publicly known attacks against cryptographic hash functions. Note that not all entries may be up to date. For a summary of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Mobile Ad-hoc Network is a network in which mobile nodes communicate with each other by the help of wireless links and mobile… 
Review
2015
Review
2015
A cryptographic hash function compresses arbitrarily long messages to digests of a short and fixed length. Most of existing hash… 
2014
2014
— With the rapid growth of online information which is unstructured in nature poses a great challenge to the text mining… 
2014
2014
A common approach to the analysis of longitudinal patient reported outcomes (PROs) is the use of summary measures such as area… 
Highly Cited
2013
Highly Cited
2013
Recent research efforts have made notable progress in improving the performance of (exhaustive) maximal clique enumeration (MCE… 
2013
2013
We present a security ontology to help non-security expert software designers or developers to: (1) design secure software and… 
Review
2012
Review
2012
Various sections of the manuscript reviewed by: C./. Allegra, NCI-Navy Medical Oncology Branch, National Cancer Institute… 
Review
1987
Review
1987
simple to complex/ familiar to unfamiliar, and factual based to higher order questions); and 3) field testing with four distinct… 
Highly Cited
1974
Highly Cited
1974
A group of 274 patients with a single intracranial aneurysm was randomly allocated to intracranial surgery. Forty patients had no… 
1962
1962
Introduction 1 Methods and terminologies 3 Chapter 1. Biological synopsis 11 Section 1-1. Identity 11 Section 1-2. Distribution…