Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,376,792 papers from all fields of science
Search
Sign In
Create Free Account
Hash function security summary
Known as:
Hash security
, Hash function security overview
, Hash function security
Expand
This article summarizes publicly known attacks against cryptographic hash functions. Note that not all entries may be up to date. For a summary of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
21 relations
Boomerang attack
Cipher security summary
Collision attack
Comparison of cryptographic hash functions
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Survey of hash security on DSR routing protocol
Supriya Das
,
P. Nand
International Conference on Computing…
2016
Corpus ID: 16258191
Mobile Ad-hoc Network is a network in which mobile nodes communicate with each other by the help of wireless links and mobile…
Expand
Review
2015
Review
2015
Open problems in hash function security
E. Andreeva
,
Bart Mennink
,
B. Preneel
Designs, Codes and Cryptography
2015
Corpus ID: 1612633
A cryptographic hash function compresses arbitrarily long messages to digests of a short and fixed length. Most of existing hash…
Expand
2014
2014
Semantic based Sentence Ordering Approach for Multi-Document Summarization
P.Sukumar
,
K.S.Gayathri
2014
Corpus ID: 212450221
— With the rapid growth of online information which is unstructured in nature poses a great challenge to the text mining…
Expand
2014
2014
Bias in Area Under the Curve for Longitudinal Clinical Trials With Missing Patient Reported Outcome Data
M. Bell
,
M. King
,
D. Fairclough
2014
Corpus ID: 56437908
A common approach to the analysis of longitudinal patient reported outcomes (PROs) is the use of summary measures such as area…
Expand
Highly Cited
2013
Highly Cited
2013
Redundancy-aware maximal cliques
Jia Wang
,
James Cheng
,
A. Fu
Knowledge Discovery and Data Mining
2013
Corpus ID: 16494932
Recent research efforts have made notable progress in improving the performance of (exhaustive) maximal clique enumeration (MCE…
Expand
2013
2013
The STAC (security toolbox: attacks & countermeasures) ontology
A. Gyrard
,
C. Bonnet
,
K. Boudaoud
The Web Conference
2013
Corpus ID: 13040826
We present a security ontology to help non-security expert software designers or developers to: (1) design secure software and…
Expand
Review
2012
Review
2012
A Review of its Pharmacodynamic and Pharmacokinetic Properties and Therapeutic Potential in the Treatment of Pneumocystis carinii Pneumonia
B. Fulton
,
Antona
,
Wagstaff
,
D. McTavish
2012
Corpus ID: 195693353
Various sections of the manuscript reviewed by: C./. Allegra, NCI-Navy Medical Oncology Branch, National Cancer Institute…
Expand
Review
1987
Review
1987
The Effect of Field-Based Learning Experiences on Students' Understanding of Selected Ecological Concepts.
M. Lisowski
1987
Corpus ID: 59852560
simple to complex/ familiar to unfamiliar, and factual based to higher order questions); and 3) field testing with four distinct…
Expand
Highly Cited
1974
Highly Cited
1974
COOPERATIVE STUDY OF INTRACRANIAL ANEURYSMS AND SUBARACHNOID HEMORRHAGE Report on a Randomized Treatment Study: III. Intracranial Surgery
C. J. Graf
,
D. W. Nibbelink
1974
Corpus ID: 2002153
A group of 274 patients with a single intracranial aneurysm was randomly allocated to intracranial surgery. Forty patients had no…
Expand
1962
1962
Studies Relevant to Mechanisms Underlying the Fluctuation in the Catch of the Japanese Sardine, Sardinops melanosticta
Z. Nakai
1962
Corpus ID: 89544998
Introduction 1 Methods and terminologies 3 Chapter 1. Biological synopsis 11 Section 1-1. Identity 11 Section 1-2. Distribution…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE