Semantic Scholar uses AI to extract papers important to this topic.
This paper proposes spongent - a family of lightweight hash functions with hash sizes of 88 (for preimage resistance only), 128… Expand RFID security is currently one of the major challenges cryptography has to face, often solved by protocols assuming that an ontag… Expand Many applications in Multilingual and Multimodal Information Access involve searching large databases of high dimensional data… Expand Fast retrieval methods are increasingly critical for many large-scale analysis tasks, and there have been several recent methods… Expand Image hash functions find extensive applications in content authentication, database search, and watermarking. This paper… Expand The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compression function on the input message. The… Expand MD5 is the hash function designed by Ron Rivest  as a strengthened version of MD4. In 1993 Bert den Boer and Antoon… Expand Example-based methods are effective for parameter estimation problems when the underlying system is simple or the dimensionality… Expand The proliferation of digital images creates problems for managing large image databases, indexing individual images, and… Expand Constructions for hash functions based on a block cipher are studied where the size of the hashcode is equal to the block length… Expand