1999
DOI: 10.1007/3-540-48969-x_8
|View full text |Cite
|
Sign up to set email alerts
|

The State of Cryptographic Hash Functions

Abstract: Abstract. This paper describes the state of the art for cryptographic hash functions. Different definitions are compared, and the few theoretical results on hash functions are discussed. A brief overview is presented of the most important constructions, and some open problems are presented.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
47
0
1

Year Published

2001
2001
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 73 publications
(48 citation statements)
references
References 70 publications
0
47
0
1
Order By: Relevance
“…This will then allow the person who generated the matrix to easily generate collisions. As stated by Preneel in [15], it is possible to avoid this problem if the matrix generation is reproducible by a user. The matrix could then simply be the output of a pseudo-random generator and this would solve both the problems of trapdoors and that of the huge matrix size.…”
Section: Resultsmentioning
confidence: 99%
“…This will then allow the person who generated the matrix to easily generate collisions. As stated by Preneel in [15], it is possible to avoid this problem if the matrix generation is reproducible by a user. The matrix could then simply be the output of a pseudo-random generator and this would solve both the problems of trapdoors and that of the huge matrix size.…”
Section: Resultsmentioning
confidence: 99%
“…Peers in DHTs such as Chord, CAN, Pastry and Tapestry maintain an index for O (log n) peers where n is the total number of peers in the system. Inherent to the design of a DHT are the following issues [11]: (i) generation of node-ids and object-ids, called keys, using cryptographic/randomizing hash functions such as SHA-1 [15][17] [30]. The objects and nodes are mapped on the overlay network depending on their key value.…”
Section: Distributed Hash Tablesmentioning
confidence: 99%
“…In order to define these attacks in a formal way, one needs to formally specify a model of computation, the inputs of the algorithm, the type of algorithm, the input distributions, etc. We will skip this as formal definitions are not essential to understand the results in this paper (see, for example, [40]). Collision attacks, second-preimage attacks, and preimage attacks can be applied to both the compression function and the hash function.…”
Section: General Constructions For Hash Functionsmentioning
confidence: 99%