[PDF][PDF] Analysis and design of cryptographic hash functions

B Preneel - 1993 - Citeseer
The subject of this thesis is the study of cryptographic hash functions. The importance of
hash functions for protecting the authenticity of information is demonstrated. Applications …

[PDF][PDF] Cryptographic hash functions: a review

R Sobti, G Geetha - International Journal of Computer Science Issues …, 2012 - Citeseer
Cryptographic Hash Functions: A Review Page 1 Cryptographic Hash Functions: A Review Rajeev
Sobti1, G.Geetha2 1School of Computer Science, Lovely Professional University Phagwara …

[PDF][PDF] Cryptographic hash functions: A survey

S Bakhtiari, R Safavi-Naini, J Pieprzyk - 1995 - Citeseer
This paper gives a survey on cryptographic hash functions. It gives an overview of all types
of hash functions and reviews design principals and possible methods of attacks. It also …

Cryptographic hash functions

B Preneel - European Transactions on Telecommunications, 1994 - Wiley Online Library
Hash functions were introduced in cryptology in the late seventies as a tool to protect the
authenticity of information. Soon it became clear that they were a very useful building block …

The state of cryptographic hash functions

B Preneel - School organized by the European Educational Forum, 1998 - Springer
This paper describes the state of the art for cryptographic hash functions. Different definitions
are compared, and the few theoretical results on hash functions are discussed. A brief …

Cryptographic hash functions: Recent design trends and security notions

S Al-Kuwari, JH Davenport, RJ Bradford - Cryptology ePrint Archive, 2011 - eprint.iacr.org
Recent years have witnessed an exceptional research interest in cryptographic hash
functions, especially after the popular attacks against MD5 and SHA-1 in 2005. In 2007, the …

Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance

P Rogaway, T Shrimpton - … : 11th International Workshop, FSE 2004, Delhi …, 2004 - Springer
We consider basic notions of security for cryptographic hash functions: collision resistance,
preimage resistance, and second-preimage resistance. We give seven different definitions …

Merkle-Damgård revisited: How to construct a hash function

JS Coron, Y Dodis, C Malinaud, P Puniya - Advances in Cryptology …, 2005 - Springer
The most common way of constructing a hash function (eg, SHA-1) is to iterate a
compression function on the input message. The compression function is usually designed …

Hash functions based on block ciphers: A synthetic approach

B Preneel, R Govaerts, J Vandewalle - Advances in Cryptology—CRYPTO' …, 1994 - Springer
Constructions for hash functions based on a block cipher are studied where the size of the
hashcode is equal to the block length of the block cipher and where the key size is …

Some observations on the theory of cryptographic hash functions

DR Stinson - Designs, Codes and Cryptography, 2006 - Springer
In this paper, we study issues related to the notion of “secure” hash functions. Several
necessary conditions are considered, as well as a popular sufficient condition (the so-called …