Sciweavers

7 search results - page 1 / 2
» Finding Second Preimages of Short Messages for Hamsi-256
Sort
View
FSE
2011
Springer
264views Cryptology» more  FSE 2011»
12 years 8 months ago
An Improved Algebraic Attack on Hamsi-256
Hamsi is one of the 14 second-stage candidates in NIST’s SHA-3 competition. The only previous attack on this hash function was a very marginal attack on its 256-bit version publi...
Itai Dinur, Adi Shamir
LATINCRYPT
2010
13 years 3 months ago
Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256
Hamsi is one of the second round candidates of the SHA-3 competition. In this study, we present non-random differential properties for the compression function of the hash functio...
Çagdas Çalik, Meltem Sönmez Tur...
ACISP
2007
Springer
13 years 11 months ago
Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions
We present a new non-interactive message authentication protocol in manual channel model (NIMAP, for short) using the weakest assumption on the manual channel (i.e. assuming the st...
Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh...
WMTE
2005
IEEE
13 years 10 months ago
Integrating M-technology into Web-based ESL Vocabulary Learning for Working Adult Learners
The paper reports on a small pilot study that explores the role of mobile technology (m-technology) in English as second language (ESL) vocabulary learning for working adult learn...
Yanjie Song, Robert Fox