A critical look at cryptographic hash function literature

Scott Contini*, Ron Steinfeld, Josef Pieprzyk, Krystian Matusiewicz

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

Abstract

The cryptographic hash function literature has numerous hash function definitions and hash function requirements, and many of them disagree. This survey talks about the various definitions, and takes steps towards cleaning up the literature by explaining how the field has evolved and accurately depicting the research aims people have today.

Original languageEnglish
Title of host publicationCoding and cryptology
Subtitle of host publicationproceedings of the first international workshop Wuyi Mountain, Fujian, China, 11 – 15 June 2007
EditorsYongqing Li, San Ling, Harald Niederreiter, Huaxiong Wang, Chaoping Xing, Shengyuan Zhang
Place of PublicationToh Tuck Link, Singapore
PublisherWorld Scientific Publishing
Pages58-79
Number of pages22
ISBN (Print)9789812832238
Publication statusPublished - 2008
Event1st International Workshop on Coding and Cryptology - Fujian, China
Duration: 11 Jun 200715 Jun 2007

Publication series

NameSeries on Coding Theory and Cryptology
PublisherWorld Scientific Publishing Co.
Volume4
ISSN (Print)1793-2238

Conference

Conference1st International Workshop on Coding and Cryptology
Country/TerritoryChina
CityFujian
Period11/06/0715/06/07

Keywords

  • DIGITAL-SIGNATURES
  • COLLISION-RESISTANCE
  • SECURITY
  • SCHEME
  • RSA
  • ATTACKS
  • PROOFS
  • OAEP

Fingerprint

Dive into the research topics of 'A critical look at cryptographic hash function literature'. Together they form a unique fingerprint.

Cite this