Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,101,581 papers from all fields of science
Search
Sign In
Create Free Account
SHA-1
Known as:
SHA1-160
, Sha0
, Sha1
Expand
In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ARM architecture
Avalanche effect
Birthday attack
Bitser (software)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
The Web Security Password Authentication based the Single-block Hash Function
Shiji Wang
,
Jing Wang
,
Yong-Zhen Li
2013
Corpus ID: 62706542
2012
2012
GENERATION OF SECURE ONE -TIME PASSWORD BASED ON IMAGE AUTHENTICATION
Himika Parmar
,
Nancy Nainan
,
S. Thaseen
2012
Corpus ID: 6802255
Phishing, a serious security threat to Internet users is an e-mail fraud in which the perpetrator sends out an email which looks…
Expand
2012
2012
A novel secure hash algorithm for public key digital signature schemes
Thulasimani Lakshmanan
,
M. Madheswaran
˜The œinternational Arab journal of information…
2012
Corpus ID: 8042355
Hash functions are the most widespread among all cryptographic primitives, and are currently used in multiple cryptographic…
Expand
2012
2012
Hardware Performance Evaluation of SHA-3 Candidate Algorithms
Y. Jararweh
,
L. Tawalbeh
,
Hala Tawalbeh
,
Abidalrahman Mohammad
J. Information Security
2012
Corpus ID: 8263871
Secure Hashing Algorithms (SHA) showed a significant importance in today’s information security applications. The National…
Expand
2009
2009
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC
Xiaoyun Wang
,
Hongbo Yu
,
Wei Wang
,
Haina Zhang
,
T. Zhan
International Conference on the Theory and…
2009
Corpus ID: 9587740
In this paper, we present the first distinguishing attack on HMAC and NMAC based on MD5 without related keys, which distinguishes…
Expand
2009
2009
Modified SHA-1 hash function (mSHA-1)
Abduvaliyev Abror
,
Sungyoung Lee
,
Young-Koo Lee
2009
Corpus ID: 62345999
In this paper we propose a modification to SHA-1 hash function. For our scheme, we use the regularly distributed pseudo random…
Expand
Review
2008
Review
2008
An Overview and Evaluation of Web Services Security Performance Optimizations
Robert A. van Engelen
,
Wei Zhang
IEEE International Conference on Web Services
2008
Corpus ID: 14952379
WS-Security is an essential component of the Web services protocol stack. WS-Security provides end-to-end security properties…
Expand
2006
2006
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?
A. Buldas
,
S. Laur
International Conference on Applied Cryptography…
2006
Corpus ID: 3200304
We study the influence of collision-finding attacks on the security of time-stamping schemes. We distinguish between client-side…
Expand
Highly Cited
2004
Highly Cited
2004
An HMAC processor with integrated SHA-1 and MD5 algorithms
Mao-Yin Wang
,
Chih-Pin Su
,
Chih-Tsun Huang
,
Cheng-Wen Wu
Asia and South Pacific Design Automation…
2004
Corpus ID: 6577464
Cryptographic algorithms are prevalent and important in digital communications and storage, e.g., both SHA-1 and MD5 algorithms…
Expand
Highly Cited
2004
Highly Cited
2004
Collisions in SHA-0
A. Joux
Annual International Cryptology Conference
2004
Corpus ID: 59747090
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE