Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Security of cryptographic hash functions

Known as: Provably secure cryptographic hash function, Provably secure hash function 
In cryptography, cryptographic hash functions can be divided into two main categories. In the first category are those functions whose designs are… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
This paper presents a new hard problem for use in cryptography, called Short Solutions to Nonlinear Equations (SSNE). This… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
2011
2011
One essential quest in cryptography is the search for hard instances of a given computational problem that is known to be hard in… Expand
  • figure 4.1
  • figure 4.2
  • figure 4.3
  • figure 5.1
  • figure 5.2
2010
2010
Secure data sharing in multi-party environments requires that both authenticity and confidentiality of the data be assured… Expand
  • figure 1
  • table 1
  • figure 2
  • table 2
  • table 3
2009
2009
Hash functions are widely used in Cryptography, and hardware implementations of hash functions are of interest in a variety of… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • figure 2
2009
2009
When biometric recognition is used for identification or verification it is important to assure the privacy of the data subject… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Review
2009
Review
2009
There is a long history of cryptographic hash functions, i.e. functions mapping variable-length strings to fixed-length strings… Expand
  • figure 1
  • figure 2
Highly Cited
2005
Highly Cited
2005
The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Many solutions… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
Highly Cited
1996
Highly Cited
1996
In this paper, we give a provably secure design for blind signatures, the most important ingredient for anonymity in off-line… Expand
  • figure 1