SHA-1

Known as: SHA1-160, Sha0, Sha1 
In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1992-2016
020406019922016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2008
2008
In this paper, we examine the resistance of the popular hash function SHA-1 and its predecessor SHA-0 against dedicated preimage… (More)
  • figure 1
  • figure 4
  • figure 5
  • figure 6
  • figure 7
Is this relevant?
Highly Cited
2006
Highly Cited
2006
The most efficient collision attacks on members of the SHA family presented so far all use complex characteristics which were… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Wireless sensor networks and Radio Frequency Identifiers are becoming mainstream applications of ubiquitous computing. They are… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
In this paper, we present new collision search attacks on the hash function SHA-1. We show that collisions of SHA-1 can be found… (More)
  • table 1
  • table 2
  • table 3
  • table 5
  • table 6
Is this relevant?
Highly Cited
2005
Highly Cited
2005
In this paper we describe improvements to the techniques used to cryptanalyze SHA-0 and introduce the first results on SHA1. The… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
In this paper, we present new techniques for collision search in the hash function SHA-0. Using the new techniques, we can find… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We report on the experiments we performed in order to assess the security of SHA-1 against the attack by Chabaud and Joux [5]. We… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
In this paper we find two near-collisions of the full compression function of SHA-0, in which up to 142 of the 160 bits of the… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
2004
2004
Cryptographic algorithms are prevalent and important in digital communications and storage, e.g., both SHA-1 and MD5 algorithms… (More)
  • figure 1
  • figure 3
  • figure 2
  • table I
  • table II
Is this relevant?
Highly Cited
1998
Highly Cited
1998
The Use of HMAC-SHA-1-96 within ESP and AH Status of this Memo This document specifies an Internet standards track protocol for… (More)
Is this relevant?