2021
DOI: 10.1016/j.jisa.2021.102782
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive review on collision-resistant hash functions on lattices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 26 publications
0
7
0
Order By: Relevance
“…Definition 2. Hash function [23,24] h(•) ∈ HF is defined such that ∀o, o ∈ O, where z = h(o) and z = h(o ), o = o makes z = z .…”
Section: Hash Functionmentioning
confidence: 99%
See 3 more Smart Citations
“…Definition 2. Hash function [23,24] h(•) ∈ HF is defined such that ∀o, o ∈ O, where z = h(o) and z = h(o ), o = o makes z = z .…”
Section: Hash Functionmentioning
confidence: 99%
“…The basic purpose of the Hash function [ 23 , 24 ] is to transmit the data with an information abstract, which is a calculated result of the function. When the data package arrives at the receiver, the information abstract is checked against the new result calculated via the receiver according to the before appoints of the communication participants.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…However, it is worth noting that several commonly used hash algorithms, including SHA-1, Snefru, MD4, MD5, RIPEMD, and HAVAL, have been discovered to be vulnerable to collision attacks. Collision attacks occur when two distinct inputs produce the same hash output, compromising the hash function's security [6][7][8]. The National Institute of Standards and Technology (NIST) took proactive measures to address this issue and enhance information security.…”
Section: Introductionmentioning
confidence: 99%