Skip to search formSkip to main contentSkip to account menu

SHA-1

Known as: SHA1-160, Sha0, Sha1 
In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Data Integrity is the most important service of cryptography. Hash functions are used to check the integrity of the file. Hash… 
2012
2012
Phishing, a serious security threat to Internet users is an e-mail fraud in which the perpetrator sends out an email which looks… 
2012
2012
Hash functions are the most widespread among all cryptographic primitives, and are currently used in multiple cryptographic… 
2012
2012
Secure Hashing Algorithms (SHA) showed a significant importance in today’s information security applications. The National… 
2009
2009
In this paper, we present the first distinguishing attack on HMAC and NMAC based on MD5 without related keys, which distinguishes… 
2009
2009
In this paper we propose a modification to SHA-1 hash function. For our scheme, we use the regularly distributed pseudo random… 
Highly Cited
2004
Highly Cited
2004
Cryptographic algorithms are prevalent and important in digital communications and storage, e.g., both SHA-1 and MD5 algorithms… 
Highly Cited
2004