2020
DOI: 10.1007/978-981-15-1624-5_11
|View full text |Cite
|
Sign up to set email alerts
|

A Journey from MD5 to SHA-3

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…In December 2010, the competition was narrowed down to five finalists: Blake, Grøstl, JH, Keccak, and Skein. In October 2012, the Keccak algorithm was selected as the SHA-3 winner [14], [15] while all five finalists continued to be used in several applications [16], [17] based on their individual strengths [18].…”
Section: Introductionmentioning
confidence: 99%
“…In December 2010, the competition was narrowed down to five finalists: Blake, Grøstl, JH, Keccak, and Skein. In October 2012, the Keccak algorithm was selected as the SHA-3 winner [14], [15] while all five finalists continued to be used in several applications [16], [17] based on their individual strengths [18].…”
Section: Introductionmentioning
confidence: 99%
“…Hash or hashing is an algorithm to check the originality of a file [21]. Hashing technique is an act of changing a process to change another data with the same value so that the data cannot be recovered [22].…”
Section: Introductionmentioning
confidence: 99%