{"id":"https://openalex.org/W4402573464","doi":"https://doi.org/10.1145/3690759","title":"Questioning the Criteria for Evaluating Non-cryptographic Hash Functions","display_name":"Questioning the Criteria for Evaluating Non-cryptographic Hash Functions","publication_year":2024,"publication_date":"2024-08-30","ids":{"openalex":"https://openalex.org/W4402573464","doi":"https://doi.org/10.1145/3690759"},"language":"en","primary_location":{"id":"doi:10.1145/3690759","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3690759","pdf_url":null,"source":{"id":"https://openalex.org/S45584542","display_name":"Queue","issn_l":"1542-7730","issn":["1542-7730","1542-7749"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Queue","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1145/3690759","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084380350","display_name":"Catherine Hayes","orcid":"https://orcid.org/0000-0002-3640-3237"},"institutions":[{"id":"https://openalex.org/I157286207","display_name":"National University of Ireland, Maynooth","ror":"https://ror.org/048nfjm95","country_code":"IE","type":"education","lineage":["https://openalex.org/I157286207"]}],"countries":["IE"],"is_corresponding":true,"raw_author_name":"Catherine Hayes","raw_affiliation_strings":["Maynooth University"],"affiliations":[{"raw_affiliation_string":"Maynooth University","institution_ids":["https://openalex.org/I157286207"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066727483","display_name":"David Malone","orcid":"https://orcid.org/0000-0002-6947-586X"},"institutions":[{"id":"https://openalex.org/I157286207","display_name":"National University of Ireland, Maynooth","ror":"https://ror.org/048nfjm95","country_code":"IE","type":"education","lineage":["https://openalex.org/I157286207"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"David Malone","raw_affiliation_strings":["Maynooth University"],"affiliations":[{"raw_affiliation_string":"Maynooth University","institution_ids":["https://openalex.org/I157286207"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5084380350"],"corresponding_institution_ids":["https://openalex.org/I157286207"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13493878,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"22","issue":"4","first_page":"54","last_page":"72"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13983","display_name":"Cybersecurity and Information Systems","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/security-of-cryptographic-hash-functions","display_name":"Security of cryptographic hash functions","score":0.7509651780128479},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.7205005884170532},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6206042766571045},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6107674837112427},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5998221635818481},{"id":"https://openalex.org/keywords/secure-hash-algorithm","display_name":"Secure Hash Algorithm","score":0.5928171277046204},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.5885889530181885},{"id":"https://openalex.org/keywords/sha-2","display_name":"SHA-2","score":0.43076881766319275},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.40770483016967773},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.40756526589393616},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3613335192203522}],"concepts":[{"id":"https://openalex.org/C165511393","wikidata":"https://www.wikidata.org/wiki/Q7252276","display_name":"Security of cryptographic hash functions","level":5,"score":0.7509651780128479},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.7205005884170532},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6206042766571045},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6107674837112427},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5998221635818481},{"id":"https://openalex.org/C9661340","wikidata":"https://www.wikidata.org/wiki/Q257799","display_name":"Secure Hash Algorithm","level":5,"score":0.5928171277046204},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.5885889530181885},{"id":"https://openalex.org/C190157925","wikidata":"https://www.wikidata.org/wiki/Q1968605","display_name":"SHA-2","level":4,"score":0.43076881766319275},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40770483016967773},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.40756526589393616},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3613335192203522}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3690759","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3690759","pdf_url":null,"source":{"id":"https://openalex.org/S45584542","display_name":"Queue","issn_l":"1542-7730","issn":["1542-7730","1542-7749"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Queue","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3690759","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3690759","pdf_url":null,"source":{"id":"https://openalex.org/S45584542","display_name":"Queue","issn_l":"1542-7730","issn":["1542-7730","1542-7749"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Queue","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1541084617","https://openalex.org/W1563402047","https://openalex.org/W1585665690","https://openalex.org/W2080234606","https://openalex.org/W2096960728","https://openalex.org/W2123845384","https://openalex.org/W2154267842","https://openalex.org/W2485621794","https://openalex.org/W2579149682","https://openalex.org/W2803763401","https://openalex.org/W3123775166","https://openalex.org/W3206432962","https://openalex.org/W4300349690","https://openalex.org/W6629683075"],"related_works":["https://openalex.org/W1663728611","https://openalex.org/W2342330140","https://openalex.org/W2785118141","https://openalex.org/W2142358564","https://openalex.org/W4289821808","https://openalex.org/W1773180899","https://openalex.org/W275246813","https://openalex.org/W2227130482","https://openalex.org/W1590262417","https://openalex.org/W2141288318"],"abstract_inverted_index":{"Although":[0],"cryptographic":[1,24],"and":[2],"non-cryptographic":[3,34],"hash":[4,49],"functions":[5],"are":[6,17],"everywhere,":[7],"there":[8,36],"seems":[9],"to":[10],"be":[11,71],"a":[12,38,58,62,72,77],"gap":[13],"in":[14],"how":[15],"they":[16],"designed.":[18],"Lots":[19],"of":[20,41,48,64],"criteria":[21],"exist":[22],"for":[23,66],"hashes":[25],"motivated":[26],"by":[27,76],"various":[28],"security":[29],"requirements,":[30],"but":[31],"on":[32],"the":[33,45],"side":[35],"is":[37],"certain":[39],"amount":[40],"folklore":[42],"that,":[43],"despite":[44],"long":[46],"history":[47],"functions,":[50],"has":[51],"not":[52],"been":[53],"fully":[54],"explored.":[55],"While":[56],"targeting":[57],"uniform":[59],"distribution":[60],"makes":[61],"lot":[63],"sense":[65],"real-world":[67],"datasets,":[68],"it":[69],"can":[70],"challenge":[73],"when":[74],"confronted":[75],"dataset":[78],"with":[79],"particular":[80],"patterns.":[81]},"counts_by_year":[],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
