Robuta

https://www.infosecinstitute.com/resources/cryptography/hash-functions/
Introduction to hash functions Hash functions are unique because they use cryptographic primitives and principles but are not cryptographic algorithms. Unli
hash functionsinfosec
https://www.nist.gov/publications/new-second-preimage-attacks-hash-functions
In this work, we present several new generic second-preimage attacks on hash functions.
second preimagehash functionsnewattacksnist
https://www.universiteitleiden.nl/onderzoek/onderzoeksoutput/wiskunde-en-natuurwetenschappen/attacks-on-hash-functions-and-applications
Promotores: R. Cramer, A.K. Lenstra, Co-Promotor: B.M.M. de Weger
hash functionsuniversiteit leidenattacksapplications
https://www.mail-archive.com/github@datafusion.apache.org/msg101937.html
optimizerehashnullbranchingutil
https://xiphera.com/hash-functions/
Jul 16, 2024 - Xiphera’s extensive portfolio of cryptographic hash functions complies with NIST standards for SHA-2, SHA-3, and Key Derivation Functions.
hash functions