The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition

Download Now
Provided by: Katholieke Universiteit Leuven
Topic: Security
Format: PDF
The first designs of cryptographic hash functions date back to the late 1970s; more proposals emerged in the 1980s. During the 1990s, the number of hash function designs grew very quickly, but for many of these proposals security flaws were identified. MD5 and SHA-1 were deployed in an ever increasing number of applications, resulting in the name \"Swiss army knives\" of cryptography. In spite of the importance of hash functions, only limited effort was spent on studying their formal definitions and foundations.
Download Now

Find By Topic