All Fields
Computer Science
Medicine
FAQ
Contact
Sign in
Hash function
Known as:
Hashing algorithm
, Hashing function
, Hashlink
Â
(More)
A hash function is any function that can be used to map data of arbitrary size to data of fixed size. The values returned by a hash function are…Â
(More)
Wikipedia
Topic mentions per year
Topic mentions per year
1968-2018
0
500
1000
1968
2018
Related topics
Related topics
50 relations
Artificial intelligence
Avalanche effect
Biological database
Cerebellar model articulation controller
(More)
Related mentions per year
Related mentions per year
1950-2018
1960
1980
2000
2020
Hash function
Watermark
Artificial intelligence
Public-key cryptography
Portable Document Format
Vector quantization
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
A Survey on Learning to Hash
Jingdong Wang
,
Ting Zhang
,
Jingkuan Song
,
Nicu Sebe
,
Heng Tao Shen
IEEE Transactions on Pattern Analysis and Machine…
2018
Nearest neighbor search is a problem of finding the data points from the database such that the distances from them to the query…Â
(More)
Is this relevant?
Highly Cited
2011
Highly Cited
2011
spongent: A Lightweight Hash Function
Andrey Bogdanov
,
Miroslav Knezevic
,
Gregor Leander
,
Deniz Toz
,
Kerem Varici
,
Ingrid Verbauwhede
CHES
2011
This paper proposes spongent – a family of lightweight hash functions with hash sizes of 88 (for preimage resistance only), 128…Â
(More)
Is this relevant?
Highly Cited
2005
Highly Cited
2005
How to Break MD5 and Other Hash Functions
Xiaoyun Wang
,
Hongbo Yu
EUROCRYPT
2005
MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and…Â
(More)
Is this relevant?
Highly Cited
1997
Highly Cited
1997
HMAC: Keyed-Hashing for Message Authentication
Hugo Krawczyk
,
Mihir Bellare
,
Ran Canetti
RFC
1997
This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind…Â
(More)
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Keying Hash Functions for Message Authentication
Mihir Bellare
,
Ran Canetti
,
Hugo Krawczyk
CRYPTO
1996
The use of cryptographic hash functions like MD5 or SHA for message authentication has become a standard approach in many…Â
(More)
Is this relevant?
Highly Cited
1992
Highly Cited
1992
Hash Function Based on Block Ciphers
Xuejia Lai
,
James L. Massey
EUROCRYPT
1992
Iterated hash functions based on block ciphers are treated. Five attacks on an iterated hash function and on its round function…Â
(More)
Is this relevant?
Highly Cited
1989
Highly Cited
1989
One Way Hash Functions and DES
Ralph C. Merkle
CRYPTO
1989
One way hash functions are a major tool in cryptography. DES is the best known and most widely used encryption function in the…Â
(More)
Is this relevant?
Highly Cited
1989
Highly Cited
1989
Universal One-Way Hash Functions and their Cryptographic Applications
Moni Naor
,
Moti Yung
STOC
1989
We define a <italic>Universal One-Way Hash Function</italic> family, a new primitive which enables the compression of elements in…Â
(More)
Is this relevant?
Highly Cited
1989
Highly Cited
1989
A Design Principle for Hash Functions
Ivan Damgård
CRYPTO
1989
We show that if there exists a computationally collision free function f from m bits to t bits where m > 1, then there exists a…Â
(More)
Is this relevant?
Highly Cited
1979
Highly Cited
1979
Universal Classes of Hash Functions
Larry Carter
,
Mark N. Wegman
J. Comput. Syst. Sci.
1979
This paper gives an input independent average linear time algorithm for storage and retrieval on keys. The algorithm makes a…Â
(More)
Is this relevant?