Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,358,664 papers from all fields of science
Search
Sign In
Create Free Account
Secure Hash Algorithm-1
Known as:
SHA1
, secure hash algorithm - 1
An algorithm for computing a condensed representation of a message or a data file that produces a 160-bit message digest.
National Institutes of Health
Create Alert
Alert
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
A second pre-image attack and a collision attack to cryptographic hash function lux
S. Fatih
,
Koçak
2017
Corpus ID: 63942883
Cryptography is a science that provides the security of information in communication. One of the most important sub-branches of…
Expand
2016
2016
Global Navigation Satellite System Multipath Mitigation Using a Wave-Absorbing Shield
Haiyan Yang
,
Xuhai Yang
,
Baoqi Sun
,
Hang Su
Italian National Conference on Sensors
2016
Corpus ID: 6260618
Code multipath is an unmanaged error source in precise global navigation satellite system (GNSS) observation processing that…
Expand
2015
2015
A chaos-based keyed hash function for secure protocol and messege authentication in mobile ad hoc wireless networks
Winai Chankasame
,
W. San-Um
Sai
2015
Corpus ID: 15377253
The design of communication protocols in the Mobile Ad hoc Networks (MANET) is challenging due to limited wireless transmission…
Expand
2014
2014
Secure and time efficient hash-based message authentication algorithm for wireless sensor networks
Haider M. Al-Mashhadi
,
Hala B. Abdul-Wahab
,
R. Hassan
Global Summit on Computer & Information…
2014
Corpus ID: 6365948
Wireless sensor networks (WSNs) are used in many applications to gather sensitive information which is then forwarded to an…
Expand
2013
2013
Performance evaluation of encryption techniques and uploading of encrypted data in cloud
V. Sreenivas
,
C. Narasimham
,
K. Subrahmanyam
,
P. Yellamma
International Conference on Computing…
2013
Corpus ID: 37975079
Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while…
Expand
2012
2012
Secure Image encryption through key hashing and wavelet transform techniques
T. Bandyopadhyay
,
B. Bandyopadhyay
,
B. N. Chatterji
2012
Corpus ID: 14778377
:- To provide security of the images in the multimedia environment encryption plays an important role. The traditional…
Expand
2012
2012
An extended approach for SMS security using authentication functions
N. Saxena
,
N. Chaudhari
,
G. L. Prajapati
7th IEEE Conference on Industrial Electronics and…
2012
Corpus ID: 18959457
Nowadays, security of SMS is a crucial aspect because it plays an important role in value added services and mobile commerce…
Expand
2007
2007
Discussion of One Improved Hash Algorithm Based on MD5 and SHA1 1
Xiaorui Chan
,
Guangzhong Liu
2007
Corpus ID: 72533
We have devised one 160 bits improved hash algorithm based on MD5 and SHA1. And in additional, we also introduce four assistant…
Expand
2007
2007
Hash Function Vulnerability Index and Hash Chain Attacks
David Lee
3rd IEEE Workshop on Secure Network Protocols
2007
Corpus ID: 7298934
A hash chain is constructed by repeated hashing from an initial value. While it finds applications for network protocol design it…
Expand
1998
1998
Preliminary Analysis of the BSAFE 3.x Pseudorandom Number Generators
R. Baldwin
1998
Corpus ID: 17183976
An enormous number of commercial applications (over 350 million copies) rely on the BSAFE and JSAFE toolkits from RSA Data…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE