[Resource Topic] 2011/565: Cryptographic Hash Functions: Recent Design Trends and Security Notions

Welcome to the resource topic for 2011/565

Title:
Cryptographic Hash Functions: Recent Design Trends and Security Notions

Authors: Saif Al-Kuwari, James H. Davenport, Russell J. Bradford

Abstract:

Recent years have witnessed an exceptional research interest in cryptographic hash functions, especially after the popular attacks against MD5 and SHA-1 in 2005. In 2007, the U.S. National Institute of Standards and Technology (NIST) has also significantly boosted this interest by announcing a public competition to select the next hash function standard, to be named SHA-3. Not surprisingly, the hash function literature has since been rapidly growing in an extremely fast pace. In this paper, we provide a comprehensive, up-to-date discussion of the current state of the art of cryptographic hash functions security and design. We first discuss the various hash functions security properties and notions, then proceed to give an overview of how (and why) hash functions evolved over the years giving raise to the current diverse hash functions design approaches.

ePrint: https://eprint.iacr.org/2011/565

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .