Skip to search formSkip to main contentSkip to account menu

SHA-1

Known as: SHA1-160, Sha0, Sha1 
In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Phishing, a serious security threat to Internet users is an e-mail fraud in which the perpetrator sends out an email which looks… 
2012
2012
Hash functions are the most widespread among all cryptographic primitives, and are currently used in multiple cryptographic… 
2012
2012
Secure Hashing Algorithms (SHA) showed a significant importance in today’s information security applications. The National… 
2009
2009
In this paper, we present the first distinguishing attack on HMAC and NMAC based on MD5 without related keys, which distinguishes… 
2009
2009
In this paper we propose a modification to SHA-1 hash function. For our scheme, we use the regularly distributed pseudo random… 
Review
2008
Review
2008
WS-Security is an essential component of the Web services protocol stack. WS-Security provides end-to-end security properties… 
2006
2006
We study the influence of collision-finding attacks on the security of time-stamping schemes. We distinguish between client-side… 
Highly Cited
2004
Highly Cited
2004
Cryptographic algorithms are prevalent and important in digital communications and storage, e.g., both SHA-1 and MD5 algorithms… 
Highly Cited
2004