Skip to search formSkip to main contentSkip to account menu

Security of cryptographic hash functions

Known as: Provably secure cryptographic hash function, Provably secure hash function 
In cryptography, cryptographic hash functions can be divided into two main categories. In the first category are those functions whose designs are… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
This paper presents a new hard problem for use in cryptography, called Short Solutions to Nonlinear Equations (SSNE). This… 
Review
2017
Review
2017
In today’s world computers are ubiquitous. They can be found in virtually any industry and most households own at least one… 
2011
2011
One essential quest in cryptography is the search for hard instances of a given computational problem that is known to be hard in… 
2009
2009
When biometric recognition is used for identification or verification it is important to assure the privacy of the data subject… 
2009
2009
Hash functions are widely used in Cryptography, and hardware implementations of hash functions are of interest in a variety of… 
Review
2009
Review
2009
There is a long history of cryptographic hash functions, i.e. functions mapping variable-length strings to fixed-length strings… 
2008
2008
Recent breakthroughs concerning the current standard SHA-1 prompted NIST to launch a competition for a new secure hash algorithm… 
2007
2007
Summary We propose a cryptographic hash function based on the difficulty of computing discrete logarithms in the group of points…