Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

One-way compression function

Known as: Miyaguchi-Preneel, Compression, Miyaguchi-Preneel hash 
In cryptography, a one-way compression function is a function that transforms two fixed-length inputs into a fixed-length output. The transformation… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
  • M. Bellare
  • Journal of Cryptology
  • 2014
  • Corpus ID: 462949
HMAC was proved in Bellare et al. (Advances in Cryptology–CRYPTO’96, Springer, Berlin, Heidelberg, 1996) to be a PRF assuming… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2013
Highly Cited
2013
Abstract. A simple new technique of parallelizing methods for solving search problems which seek collisions in pseudorandom walks… Expand
  • figure 1
  • table 1
  • figure 2
Highly Cited
2008
Highly Cited
2008
  • M. Stam
  • CRYPTO
  • 2008
  • Corpus ID: 14160617
Suppose we are given a perfect n+ c-to-nbit compression function fand we want to construct a larger m+ s-to-sbit compression… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Highly Cited
2008
Highly Cited
2008
While there is agreement that participation in online asynchronous discussions can enhance student learning, it has also been… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2002
Highly Cited
2002
Summary Stomatal behaviour of plants in drying soil can be regulated by (long distance) chemical signals that provide the shoot… Expand
  • figure 1
  • figure 1
  • figure 3
  • figure 2
  • figure 4
Highly Cited
2000
Highly Cited
2000
Preface Part I. Introduction: 1. The socioecology of primate males: history and theory Peter M. Kappeler Part II. Comparative… Expand
Highly Cited
1999
Highly Cited
1999
This article presents a study of the effects of various shopping center design and management attributes on consumer evaluations… Expand
  • table 1
  • figure 1
  • figure 2
  • table 2
  • table 2
Highly Cited
1993
Highly Cited
1993
Constructions for hash functions based on a block cipher are studied where the size of the hashcode is equal to the block length… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 4
Highly Cited
1989
Highly Cited
1989
  • B. Crespi
  • Animal Behaviour
  • 1989
  • Corpus ID: 53183073
Abstract Assortative mating by size, one of the most common mating patterns in natural populations, may be explained by three… Expand
Highly Cited
1986
Highly Cited
1986
Abstract Under versions of what may broadly be called the Resource Dispersion Hypothesis (RDH) several authors have concluded… Expand