Cryptographic hash functions

B Preneel - European Transactions on Telecommunications, 1994 - Wiley Online Library
… If a hash function has to be useful for cryptographic applications, it has to satisfy some
additional conditions. Informally, one has to impose that the hash function is one-way (hard to in…

[PDF][PDF] Cryptographic hash functions: a review

R Sobti, G Geetha - International Journal of Computer Science Issues …, 2012 - Citeseer
… However if it satisfies some additional requirements (as detailed further), then it can be
used for cryptographic applications and then known as Cryptographic Hash functions. … Block …

[PDF][PDF] Analysis and design of cryptographic hash functions

B Preneel - 1993 - Citeseer
… In this thesis cryptographic hash functions will be studied … Chapter 2 contains an overview
of cryptographic hash functions. … of hash functions, and an extensive taxonomy of attacks on …

Some observations on the theory of cryptographic hash functions

DR Stinson - Designs, Codes and Cryptography, 2006 - Springer
… Security of hash functions has been considered in many papers, but it is still not completely
… for a cryptographic hash function to be “secure”. The notion of a secure hash function is …

[PDF][PDF] An overview of cryptographic hash functions and their uses

JE Silva - GIAC, 2003 - target0.be
… Our example above could not be considered a cryptographic hash function because it would
be trivial to construct two inputs to this hash function that would create the same output, for …

Cryptographic hash functions: Recent design trends and security notions

S Al-Kuwari, JH Davenport, RJ Bradford - Cryptology ePrint Archive, 2011 - eprint.iacr.org
cryptographic hash functions security and design. We first discuss the various hash functions
… of how (and why) hash functions evolved over the years giving raise to the current diverse …

Low-complexity cryptographic hash functions

B Applebaum, N Haramaty-Krasne, Y Ishai… - 2017 - dspace.mit.edu
… of a random function. The main focus of this work is on collision resistant hash functions (CRH)…
which the function has the same output.However, we will also consider universal one-way …

Cryptographic hash functions from expander graphs

DX Charles, KE Lauter, EZ Goren - Journal of CRYPTOLOGY, 2009 - Springer
… When the hash function is constructed from one of Pizer’s … Constructing our hash functions
from optimal expander graphs … these hash functions, and we implement our hash function

Cryptographic hash functions

SS Thomsen - 2009 - orbit.dtu.dk
… For a cryptographic hash function to be of any use in cryptography, it has to satisfy certain
conditions. It is difficult to state all these conditions, however, since hash functions are used in …

[PDF][PDF] Theoretical and experimental analysis of cryptographic hash functions

J Tchórzewski, A Jakóbik - Journal of Telecommunications and …, 2019 - bibliotekanauki.pl
… theoretical introduction to the cryptographic hash function theory and a statistical experimental
analysis of selected hash functions. The definition of hash functions, differences between …