Sciweavers

206 search results - page 3 / 42
» Analysis of Multivariate Hash Functions
Sort
View
ASIACRYPT
2006
Springer
13 years 9 months ago
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
Understanding what construction strategy has a chance to be a good hash function is extremely important nowadays. In TCC'04, Maurer et al. [13] introduced the notion of indiff...
Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yu...
SIBGRAPI
2006
IEEE
13 years 11 months ago
Exploratory visualization based on multidimensional transfer functions and star coordinates
Exploration and analysis of multivariate data play an important role in different domains. This work proposes a simple interface prototype that allows a human user to visually expl...
Alex Laier Bordignon, Rener Castro, Hélio L...
MYCRYPT
2005
Springer
248views Cryptology» more  MYCRYPT 2005»
13 years 11 months ago
A Family of Fast Syndrome Based Cryptographic Hash Functions
Recently, some collisions have been exposed for a variety of cryptographic hash functions [20,21] including some of the most widely used today. Many other hash functions using simi...
Daniel Augot, Matthieu Finiasz, Nicolas Sendrier
PKC
1998
Springer
158views Cryptology» more  PKC 1998»
13 years 10 months ago
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation
One-way hash functions are an important tool in achieving authentication and data integrity. The aim of this paper is to propose a novel one-way hash function based on cellular aut...
Miodrag J. Mihaljevic, Yuliang Zheng, Hideki Imai
ACISP
2010
Springer
13 years 7 months ago
Distinguishers for the Compression Function and Output Transformation of Hamsi-256
Hamsi is one of 14 remaining candidates in NIST's Hash Competition for the future hash standard SHA-3. Until now, little analysis has been published on its resistance to diffe...
Jean-Philippe Aumasson, Emilia Käsper, Lars R...