Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,792,094 papers from all fields of science
Search
Sign In
Create Free Account
N-Hash
In cryptography, N-Hash is a cryptographic hash function based on the FEAL round function, and is now considered insecure. It was proposed in 1990 by…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Birthday attack
Cryptographic hash function
Cryptography
Differential cryptanalysis
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
An Efficient Association Rule Mining Using the H-BIT Array Hashing Algorithm
R. Paper
,
L.Padmavathy
,
V.Umarani
2013
Corpus ID: 212523465
: Association Rule Mining (ARM) finds the interesting relationship between presences of various items in a given database…
Expand
2001
2001
Differential Cryptanalysis of Feal and N-Hash Eli
Biham Adi Shamir
2001
Corpus ID: 12350519
In [1,2] we introduced the notion of differential cryptanalysis and described its application to DES[8] and several of its…
Expand