Questioning the Criteria for Evaluating Non-cryptographic Hash Functions

被引:0
|
作者
Hayes, Catherine [1 ]
Malone, David [1 ]
机构
[1] Maynooth University, 60026281, Ireland
来源
Queue | 2024年 / 22卷 / 04期
关键词
Hash functions;
D O I
10.1145/3690759
中图分类号
学科分类号
摘要
Although cryptographic and non-cryptographic hash functions are everywhere, there seems to be a gap in how they are designed. Lots of criteria exist for cryptographic hashes motivated by various security requirements, but on the non-cryptographic side there is a certain amount of folklore that, despite the long history of hash functions, has not been fully explored. While targeting a uniform distribution makes a lot of sense for real-world datasets, it can be a challenge when confronted by a dataset with particular patterns. © 2024 Owner/Author.
引用
收藏
页码:54 / 72
相关论文
共 50 条
  • [21] Bad Directions in Cryptographic Hash Functions
    Bernstein, Daniel J.
    Huelsing, Andreas
    Lange, Tanja
    Niederhagen, Ruben
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 488 - 508
  • [22] Cryptographic Hash Functions: Theory and Practice
    Preneel, Bart
    INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 1 - 3
  • [23] Cryptographic hash functions in digital economy
    2001, Technical University of Wroclaw
  • [24] Cryptographic Hash Functions from Expander Graphs
    Charles, Denis X.
    Lauter, Kristin E.
    Goren, Eyal Z.
    JOURNAL OF CRYPTOLOGY, 2009, 22 (01) : 93 - 113
  • [25] Some Observations on the Theory of Cryptographic Hash Functions
    D. R. Stinson
    Designs, Codes and Cryptography, 2006, 38 : 259 - 277
  • [26] Performance and Security Tradeoffs in Cryptographic Hash Functions
    Almuhammadi, Sultan
    Bawazeer, Omar Mohammed
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2020, 12 (04) : 37 - 51
  • [27] Cryptographic Hash Functions from Expander Graphs
    Denis X. Charles
    Kristin E. Lauter
    Eyal Z. Goren
    Journal of Cryptology, 2009, 22 : 93 - 113
  • [28] Petra-r cryptographic hash functions
    Najjar, M
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 253 - 259
  • [29] Some observations on the theory of cryptographic hash functions
    Stinson, DR
    DESIGNS CODES AND CRYPTOGRAPHY, 2006, 38 (02) : 259 - 277
  • [30] Origami Voting: A Non-cryptographic Approach to Transparent Ballot Verification
    Blanchard, Enka
    Selker, Ted
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2020, 2020, 12063 : 273 - 290