Security of cryptographic hash functions
Cube attacks on cryptographic hash functions
66
On the Indifferentiability of the Integrated-Key Hash Functions
27
Bad directions in cryptographic hash functions
27
Building Secure and Fast Cryptographic Hash Functions Using Programmable Cellular Automata
12
A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function Grøstl
14
High Speed FPGA Implementation of Cryptographic Hash Function
65
The Cryptographic Hardness of Random Local Functions -- Survey
35
How to Break MD5 and Other Hash Functions
17
A mathematical problem for security analysis of hash functions and pseudorandom generators
19
Faster Cryptographic Hash Function From Supersingular Isogeny Graphs
20
A Fast New Cryptographic Hash Function Based on Integer Tent Mapping System
10
Overview of blockchain technology cryptographic security
58
On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions
36
Design of RSA Digital Signature Scheme Using A Novel Cryptographic Hash Algorithm
5
On the Impact of Known-Key Attacks on Hash Functions
38
Homomorphic Signatures from Chameleon Hash Functions
13
Adversarially Robust Property Preserving Hash Functions
53
Backdoored Hash Functions: Immunizing HMAC and HKDF
31
Security in Cloud Computing Hash Function
5
Ensuring Confidentiality in Cryptographic Protocols with the Witness-Functions
15