Sciweavers

20 search results - page 1 / 4
» A New Strategy for Finding a Differential Path of SHA-1
Sort
View
ACISP
2007
Springer
13 years 9 months ago
A New Strategy for Finding a Differential Path of SHA-1
In this paper, we propose a new construction algorithm for finding differential paths of Round 1 of SHA-1 for use in the collision search attack. Generally, the differential path o...
Jun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwa...
LCN
2003
IEEE
13 years 10 months ago
Strategies for Finding Stable Paths in Mobile Wireless Ad Hoc Networks
In this paper, we introduce statistical methods to estimate the stability of paths in a mobile wireless ad hoc environment. Identifying stable paths helps to reduce control trafï¬...
Michael Gerharz, Christian de Waal, Peter Martini,...
FSE
2008
Springer
162views Cryptology» more  FSE 2008»
13 years 6 months ago
Collisions on SHA-0 in One Hour
At Crypto 2007, Joux and Peyrin showed that the boomerang attack, a classical tool in block cipher cryptanalysis, can also be very useful when analyzing hash functions. They applie...
Stéphane Manuel, Thomas Peyrin
TELSYS
2010
122views more  TELSYS 2010»
13 years 3 months ago
Transmission scheduling for multi-homed transport protocols with network failure tolerance
In heterogeneous network environments, the network connections of a multi-homed device may have significant bandwidth differential. For a multihomed transmission protocol designed ...
Yuansong Qiao, Enda Fallon, John Murphy, Liam Murp...
HICSS
2003
IEEE
135views Biometrics» more  HICSS 2003»
13 years 10 months ago
Market Entry Strategies of Application Service Providers: Identifying Strategic Differentiation
In the last few years there has been much interest in the delivery of software-as-a-service. The concept of the remote delivery of software by Application Service Providers (ASPs)...
Bhavini Desai, Vishanth Weerakkody, Wendy Currie, ...