[PDF][PDF] Cryptographic hash functions: an overview
B Preneel, R Govaerts, J Vandewalle - Proceedings of the 6th international …, 1993 - Citeseer
Cryptographic hash functions are a useful building block for several cryptographic
applications. The most important are certainly the protection of information authentication …
applications. The most important are certainly the protection of information authentication …
[PDF][PDF] Cryptographic hash functions: A survey
S Bakhtiari, R Safavi-Naini, J Pieprzyk - 1995 - Citeseer
This paper gives a survey on cryptographic hash functions. It gives an overview of all types
of hash functions and reviews design principals and possible methods of attacks. It also …
of hash functions and reviews design principals and possible methods of attacks. It also …
Broad view of cryptographic hash functions
MA AlAhmad, IF Alshaikhli - International Journal of Computer …, 2013 - search.proquest.com
Cryptographic hash function is a function that takes an arbitrary length as an input and
produces a fixed size of an output. The viability of using cryptographic hash function is to …
produces a fixed size of an output. The viability of using cryptographic hash function is to …
The NIST cryptographic workshop on hash functions
The NIST Cryptographic Workshop on Hash Functions Page 1 Conference Reports Editor: Carl
Landwehr, clandweh@isr.umd.edu replacement options. The NIST Cryptographic Workshop …
Landwehr, clandweh@isr.umd.edu replacement options. The NIST Cryptographic Workshop …
Cryptographic hash functions
SS Thomsen - 2009 - orbit.dtu.dk
Cryptographic hash functions are commonly used in many different areas of cryptography: in
digital signatures and in public-key cryptography, for password protection and message …
digital signatures and in public-key cryptography, for password protection and message …
A critical look at cryptographic hash function literature
S Contini, R Steinfeld, J Pieprzyk… - Coding and …, 2008 - World Scientific
The cryptographic hash function literature has numerous hash function definitions and hash
function requirements, and many of them disagree. This survey talks about the various …
function requirements, and many of them disagree. This survey talks about the various …
The state of cryptographic hash functions
B Preneel - School organized by the European Educational Forum, 1998 - Springer
This paper describes the state of the art for cryptographic hash functions. Different definitions
are compared, and the few theoretical results on hash functions are discussed. A brief …
are compared, and the few theoretical results on hash functions are discussed. A brief …
Cryptographic hash functions
JA Buchmann, JA Buchmann - Introduction to Cryptography, 2004 - Springer
Cryptographic Hash Functions Page 1 CHAPTER Cryptographic Hash Functions In this chapter,
we discuss cryptographic hash functions. They are used, for example, in digital signatures …
we discuss cryptographic hash functions. They are used, for example, in digital signatures …
[PDF][PDF] Cryptographic hash functions: a review
Cryptographic Hash Functions: A Review Page 1 Cryptographic Hash Functions: A Review Rajeev
Sobti1, G.Geetha2 1School of Computer Science, Lovely Professional University Phagwara …
Sobti1, G.Geetha2 1School of Computer Science, Lovely Professional University Phagwara …
Cryptographic hash functions: Recent design trends and security notions
Recent years have witnessed an exceptional research interest in cryptographic hash
functions, especially after the popular attacks against MD5 and SHA-1 in 2005. In 2007, the …
functions, especially after the popular attacks against MD5 and SHA-1 in 2005. In 2007, the …