Research

Cryptographic hash functions: recent design trends and security notions


Reference:

Al-Kuwari, S., Davenport, J. H. and Bradford, R. J., 2010. Cryptographic hash functions: recent design trends and security notions. In: Short Paper Proceedings of 6th China International Conference on Information Security and Cryptology (Inscrypt '10). Science Press of China, pp. 133-150.

Related documents:

[img] PDF (HashFunction_Survey_FINAL_221011-1.pdf) - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
Download (1185kB)

    Abstract

    Recent years have witnessed an exceptional research interest in cryptographic hash functions, especially after the popular attacks against MD5 and SHA-1 in 2005. In 2007, the U.S. National Institute of Standards and Technology (NIST) has also significantly boosted this interest by announcing a public competition to select the next hash function standard, to be named SHA-3. Not surprisingly, the hash function literature has since been rapidly growing in an extremely fast pace. In this paper, we provide a comprehensive, up-to-date discussion of the current state of the art of cryptographic hash functions security and design. We first discuss the various hash functions security properties and notions, then proceed to give an overview of how (and why) hash functions evolved over the years giving raise to the current diverse hash functions design approaches

    Details

    Item Type Book Sections
    CreatorsAl-Kuwari, S., Davenport, J. H. and Bradford, R. J.
    DepartmentsFaculty of Science > Computer Science
    StatusPublished
    ID Code20815
    Additional InformationThe 6th China International Conference on Information Security and Cryptology (Inscrypt 2010), 20-23 October 2010, Shanghai, China.

    Export

    Actions (login required)

    View Item

    Document Downloads

    More statistics for this item...