[PDF][PDF] Cryptographic hash functions: an overview

B Preneel, R Govaerts, J Vandewalle - Proceedings of the 6th international …, 1993 - Citeseer
Cryptographic hash functions are a useful building block for several cryptographic
applications. The most important are certainly the protection of information authentication …

[PDF][PDF] Cryptographic hash functions: A survey

S Bakhtiari, R Safavi-Naini, J Pieprzyk - 1995 - Citeseer
This paper gives a survey on cryptographic hash functions. It gives an overview of all types
of hash functions and reviews design principals and possible methods of attacks. It also …

Broad view of cryptographic hash functions

MA AlAhmad, IF Alshaikhli - International Journal of Computer …, 2013 - search.proquest.com
Cryptographic hash function is a function that takes an arbitrary length as an input and
produces a fixed size of an output. The viability of using cryptographic hash function is to …

The NIST cryptographic workshop on hash functions

C Rechberger, V Rijmen, N Sklavos - IEEE Security & Privacy, 2006 - ieeexplore.ieee.org
The NIST Cryptographic Workshop on Hash Functions Page 1 Conference Reports Editor: Carl
Landwehr, clandweh@isr.umd.edu replacement options. The NIST Cryptographic Workshop …

Cryptographic hash functions

SS Thomsen - 2009 - orbit.dtu.dk
Cryptographic hash functions are commonly used in many different areas of cryptography: in
digital signatures and in public-key cryptography, for password protection and message …

A critical look at cryptographic hash function literature

S Contini, R Steinfeld, J Pieprzyk… - Coding and …, 2008 - World Scientific
The cryptographic hash function literature has numerous hash function definitions and hash
function requirements, and many of them disagree. This survey talks about the various …

The state of cryptographic hash functions

B Preneel - School organized by the European Educational Forum, 1998 - Springer
This paper describes the state of the art for cryptographic hash functions. Different definitions
are compared, and the few theoretical results on hash functions are discussed. A brief …

Cryptographic hash functions

JA Buchmann, JA Buchmann - Introduction to Cryptography, 2004 - Springer
Cryptographic Hash Functions Page 1 CHAPTER Cryptographic Hash Functions In this chapter,
we discuss cryptographic hash functions. They are used, for example, in digital signatures …

[PDF][PDF] Cryptographic hash functions: a review

R Sobti, G Geetha - International Journal of Computer Science Issues …, 2012 - Citeseer
Cryptographic Hash Functions: A Review Page 1 Cryptographic Hash Functions: A Review Rajeev
Sobti1, G.Geetha2 1School of Computer Science, Lovely Professional University Phagwara …

Cryptographic hash functions: Recent design trends and security notions

S Al-Kuwari, JH Davenport, RJ Bradford - Cryptology ePrint Archive, 2011 - eprint.iacr.org
Recent years have witnessed an exceptional research interest in cryptographic hash
functions, especially after the popular attacks against MD5 and SHA-1 in 2005. In 2007, the …