Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 219,937,502 papers from all fields of science
Search
Sign In
Create Free Account
Hash function
Known as:
Hashing algorithm
, Hashing function
, Hashlink
Expand
A hash function is any function that can be used to map data of arbitrary size to data of fixed size. The values returned by a hash function are…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Abstract data type
Artificial intelligence (video games)
Backup
Biological database
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Parallel chaotic hash function based on the shuffle-exchange network
J. Teh
,
A. Samsudin
,
A. Akhavan
Nonlinear dynamics
2015
Corpus ID: 60923582
In recent years, cryptologists have been delving into chaos theory to design more secure cryptographic primitives. However, many…
Expand
Highly Cited
2012
Highly Cited
2012
Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism
Chuan Qin
,
Chinchen Chang
,
Pei-Yu Chen
Signal Processing
2012
Corpus ID: 35457309
Highly Cited
2008
Highly Cited
2008
Range queries on structured overlay networks
T. Schütt
,
F. Schintke
,
A. Reinefeld
Computer Communications
2008
Corpus ID: 28875271
Highly Cited
2007
Highly Cited
2007
Known-Key Distinguishers for Some Block Ciphers
L. Knudsen
,
V. Rijmen
International Conference on the Theory and…
2007
Corpus ID: 6115829
We present two block cipher distinguishers in a setting where the attacker knows the key. One is a distinguisher for AES reduced…
Expand
Highly Cited
2007
Highly Cited
2007
Reversible Data-Hiding Scheme for 2-D Vector Maps Based on Difference Expansion
Xiaotong Wang
,
Chengyong Shao
,
Xiaogang Xu
,
X. Niu
IEEE Transactions on Information Forensics and…
2007
Corpus ID: 6080139
Reversible watermarking is suitable for hiding data in 2-D vector maps because the distortions induced by data embedding can be…
Expand
Highly Cited
2006
Highly Cited
2006
A Case Against Currently Used Hash Functions in RFID Protocols
Martin Feldhofer
,
Christian Rechberger
OTM Workshops
2006
Corpus ID: 18559233
Designers of RFID security protocols can choose between a wide variety of cryptographic algorithms However, when implementing…
Expand
Highly Cited
2003
Highly Cited
2003
Efficient multicast stream authentication using erasure codes
J. Park
,
E. Chong
,
H. Siegel
TSEC
2003
Corpus ID: 17114395
We describe a novel method for authenticating multicast packets that is robust against packet loss. Our focus is to minimize the…
Expand
Highly Cited
2001
Highly Cited
2001
Counting twig matches in a tree
Zhiyuan Chen
,
H. V. Jagadish
,
+4 authors
D. Srivastava
Proceedings / International Conference on Data…
2001
Corpus ID: 1901694
Describes efficient algorithms for accurately estimating the number of matches of a small node-labeled tree, i.e. a twig, in a…
Expand
Highly Cited
2001
Highly Cited
2001
On random walks for Pollard's rho method
Edlyn Teske
Mathematics of Computation
2001
Corpus ID: 5610482
We consider Pollard's rho method for discrete logarithm computation. Usually, in the analysis of its running time the assumption…
Expand
Review
1990
Review
1990
LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications
Lawrence Brown
,
J. Pieprzyk
,
J. Seberry
AUSCRYPT
1990
Corpus ID: 23149145
This paper provides an overview of the LOKI encryption primitive which may be used to encrypt and decrypt a 64-bit block of data…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE