Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,391,229 papers from all fields of science
Search
Sign In
Create Free Account
Hash function
Known as:
Hashing algorithm
, Hashing function
, Hashlink
Expand
A hash function is any function that can be used to map data of arbitrary size to data of fixed size. The values returned by a hash function are…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Abstract data type
Artificial intelligence (video games)
Backup
Biological database
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Parallel chaotic hash function based on the shuffle-exchange network
J. Teh
,
A. Samsudin
,
A. Akhavan
Nonlinear dynamics
2015
Corpus ID: 60923582
In recent years, cryptologists have been delving into chaos theory to design more secure cryptographic primitives. However, many…
Expand
Highly Cited
2013
Highly Cited
2013
A novel image encryption based on hash function with only two-round diffusion process
Benyamin Norouzi
,
Seyed Mohammad Seyedzadeh
,
S. Mirzakuchaki
,
M. Mosavi
Multimedia Systems
2013
Corpus ID: 17091843
In this paper, a novel algorithm for image encryption based on hash function is proposed. In our algorithm, a 512-bit long…
Expand
Highly Cited
2012
Highly Cited
2012
Spherical hashing
Jae-Pil Heo
,
Youngwoon Lee
,
Junfeng He
,
Shih-Fu Chang
,
Sung-eui Yoon
IEEE Conference on Computer Vision and Pattern…
2012
Corpus ID: 11289341
Many binary code encoding schemes based on hashing have been actively studied recently, since they can provide efficient…
Expand
Highly Cited
2010
Highly Cited
2010
Semi-supervised hashing for scalable image retrieval
Jun Wang
,
O. Kumar
,
Shih-Fu Chang
IEEE Computer Society Conference on Computer…
2010
Corpus ID: 5817453
Large scale image search has recently attracted considerable attention due to easy availability of huge amounts of data. Several…
Expand
Highly Cited
2007
Highly Cited
2007
A Framework for Iterative Hash Functions - HAIFA
E. Biham
,
O. Dunkelman
IACR Cryptology ePrint Archive
2007
Corpus ID: 607594
Since the seminal works of Merkle and Damgard on the iter- ation of compression functions, hash functions were built from compres…
Expand
Highly Cited
2004
Highly Cited
2004
Identity-Based Chameleon Hash and Applications
G. Ateniese
,
B. D. Medeiros
Financial Cryptography
2004
Corpus ID: 7635024
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular…
Expand
Highly Cited
2003
Highly Cited
2003
The WHIRLPOOL Hashing Function
Paulo S.L.M
,
V. Rijmen
2003
Corpus ID: 59865441
We present Whirlpool, a 512-bit hash function operating on messages less than 2 bits in length. The function structure is…
Expand
Highly Cited
2002
Highly Cited
2002
Toward Hierarchical Identity-Based Encryption
J. Horwitz
,
Ben Lynn
International Conference on the Theory and…
2002
Corpus ID: 3208921
We introduce the concept of hierarchical identity-based encryption (HIBE) schemes, give precise definitions of their security and…
Expand
Highly Cited
1998
Highly Cited
1998
The Block Cipher Rijndael
J. Daemen
,
V. Rijmen
Smart Card Research and Advanced Application…
1998
Corpus ID: 10001157
In this paper we present the block cipher Rijndael, which is one of the fifteen candidate algorithms for the Advanced Encryption…
Expand
Highly Cited
1997
Highly Cited
1997
A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost
M. Bellare
,
Daniele Micciancio
International Conference on the Theory and…
1997
Corpus ID: 6081825
We present a simple, new paradigm for the design of collision-free hash functions. Any function emanating from this paradigm is…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required