A hash function is any function that can be used to map data of arbitrary size to data of fixed size. The values returned by a hash function areâ€¦Â (More)

Semantic Scholar uses AI to extract papers important to this topic.

Review

2018

Review

2018

- Jingdong Wang, Ting Zhang, Jingkuan Song, Nicu Sebe, Heng Tao Shen
- IEEE Transactions on Pattern Analysis and Machineâ€¦
- 2018

Nearest neighbor search is a problem of finding the data points from the database such that the distances from them to the queryâ€¦Â (More)

Is this relevant?

Highly Cited

2011

Highly Cited

2011

- Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede
- CHES
- 2011

This paper proposes spongent â€“ a family of lightweight hash functions with hash sizes of 88 (for preimage resistance only), 128â€¦Â (More)

Is this relevant?

Highly Cited

2005

Highly Cited

2005

- Xiaoyun Wang, Hongbo Yu
- EUROCRYPT
- 2005

MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, andâ€¦Â (More)

Is this relevant?

Highly Cited

1997

Highly Cited

1997

- Hugo Krawczyk, Mihir Bellare, Ran Canetti
- RFC
- 1997

This memo provides information for the Internet community. This memo does not specify an Internet standard of any kindâ€¦Â (More)

Is this relevant?

Highly Cited

1996

Highly Cited

1996

- Mihir Bellare, Ran Canetti, Hugo Krawczyk
- CRYPTO
- 1996

The use of cryptographic hash functions like MD5 or SHA for message authentication has become a standard approach in manyâ€¦Â (More)

Is this relevant?

Highly Cited

1992

Highly Cited

1992

- Xuejia Lai, James L. Massey
- EUROCRYPT
- 1992

Iterated hash functions based on block ciphers are treated. Five attacks on an iterated hash function and on its round functionâ€¦Â (More)

Is this relevant?

Highly Cited

1989

Highly Cited

1989

- Ralph C. Merkle
- CRYPTO
- 1989

One way hash functions are a major tool in cryptography. DES is the best known and most widely used encryption function in theâ€¦Â (More)

Is this relevant?

Highly Cited

1989

Highly Cited

1989

We define a <italic>Universal One-Way Hash Function</italic> family, a new primitive which enables the compression of elements inâ€¦Â (More)

Is this relevant?

Highly Cited

1989

Highly Cited

1989

- Ivan DamgÃ¥rd
- CRYPTO
- 1989

We show that if there exists a computationally collision free function f from m bits to t bits where m > 1, then there exists aâ€¦Â (More)

Is this relevant?

Highly Cited

1979

Highly Cited

1979

- Larry Carter, Mark N. Wegman
- J. Comput. Syst. Sci.
- 1979

This paper gives an input independent average linear time algorithm for storage and retrieval on keys. The algorithm makes aâ€¦Â (More)

Is this relevant?